source stringlengths 32 199 | text stringlengths 26 3k |
|---|---|
https://en.wikipedia.org/wiki/Allegheny%20Health%20Network | Allegheny Health Network (AHN), based in Pittsburgh, is a non-profit, 14-hospital academic medical system with facilities located in Western Pennsylvania and one hospital in Western New York. AHN was formed in 2013 when Highmark Inc., a Pennsylvania-based Blue Cross Blue Shield insurance carrier, purchased the assets of the West Penn Allegheny Health System (WPAHS) and added three more hospitals to its provider division. Allegheny Health Network was formed to act as the parent company to the WPAHS hospitals and its affiliate hospitals. Highmark Health today serves as the ultimate parent of AHN.
Today, AHN consists of an academic hospital and transplant center (Allegheny General Hospital in Pittsburgh, the network's flagship), five tertiary-care hospitals, four community hospitals, and four "neighborhood hospitals." The network cares for patients from western Pennsylvania and the adjacent regions of Ohio, West Virginia, New York and Maryland at more than 250 clinical locations, including five “Health + Wellness Pavilions,” cancer clinics, surgical centers, outpatient clinics, and primary care locations.
The system includes the AHN Research Institute, the Allegheny Clinic, a home health and infusion company, a group-purchasing organization, LifeFlight, and the STAR Center, which provides simulation training for medical, nursing, and other health care professionals. The network operates two nursing schools, and serves as a clinical campus for the medical schools of Drexel University and Lake Erie College of Osteopathic Medicine. AHN also operates one of the nation's largest graduate medical education programs, and its teaching hospitals annually train about 500 medical residents and fellows in 48 accredited programs and specialties.
As of 2023, AHN employs approximately 22,000 people, with over 2,600 employed and affiliated physicians, plus 2,000 volunteers. In 2022, AHN's facilities admitted and / or observed 120,000 patients, logged 340,000 emergency room visits, recorded 3.6 million physician visits, and delivered 8,600 babies.
Facilities
AHN Wexford Hospital
AHN Wexford is a 160-bed, $313 million, 345,000-square-foot hospital built along Route 19, north of Pittsburgh. Opened in the fall of 2021, AHN Wexford is the network's newest full-service hospital, and includes a 24-bed emergency department with specialized pediatric and behavioral health rooms; operating rooms with minimally invasive robotic surgery capabilities; a cardiac catheterization lab and hybrid OR for advanced surgical procedures; a short-stay observation unit; an adult intensive care unit; and comprehensive women's and infants' care.
The women's unit includes the only labor and delivery unit based in northern Allegheny County, as well as high-risk obstetrical services and a Level II neonatal intensive care unit.
Allegheny General Hospital
Now the academic flagship of Allegheny Health Network, Allegheny General Hospital (AGH) began as a 50-bed infirmary, housed in two adj |
https://en.wikipedia.org/wiki/Computer%20Press%20Association | Founded in 1983, the Computer Press Association (CPA) was established to promote excellence in the field of computer journalism. The association was composed of working editors, writers, producers, and freelancers who covered issues related to computers and technology. The CPA conducted the annual Computer Press Awards, which was the preeminent editorial awards of the computer and technology media. The CPA Awards honored outstanding examples in print, broadcast and electronic media. Awards were given for print publications, such as PC Magazine; online news media, such as Newsbytes News Network (both were multiple winners); individual columns and features by well-known journalists such as Steven Levy (author of “Hackers: Heroes of the Computer Revolution”); broadcast awards such as “Best Radio Program”; as well as book awards in categories such as Best Product Specific Book. CPA President Jeff Yablon (1994-1996) developed an updated code of ethics for technology journalists that was adopted by many major trade show groups, most notably Bruno Blenheim. The Computer Press Association disbanded in 2000.
Individuals winning multiple Computer Press Association awards include:
Wendy Woods (3 times)
John C. Dvorak (8 times)
Woody Leonhard (8 times)
Deke McClelland (7 times)
Brock N. Meeks (4 times)
Ed Bott (3 times)
Danny Goodman (3 times)
Linda Rohrbough (3 times)
Mary McFall Axelson (2 times)
David D. Busch (2 times)
Jonathan Littman (2 times)
David Pogue (2 times)
Ed Scannell (2 times)
Neil J. Salkind (2 times)
References
History of computing |
https://en.wikipedia.org/wiki/Technological%20Institute%20of%20the%20Philippines | The Technological Institute of the Philippines (T.I.P.; Filipino: Institusyong Panteknolohiya ng Pilipinas) is one of the country’s engineering colleges that also offers programs in computing, architecture, business, education, and the arts located in Metro Manila, Philippines. It is a private non-sectarian stock school founded on February 8, 1962, by a group of educators headed by Engineer Demetrio A. Quirino, Jr. and Dr. Teresita U. Quirino.
The institute has two campuses in Quiapo, Manila, and Cubao, Quezon City, with over 23,000 graduate, undergraduate, and senior high school students. T.I.P. is the only institution in the Philippines that offers Professional Science Master's degree programs in engineering management and data science. As a research institution in technology, T.I.P. is also one of the institutions in the Philippines that offers the professional doctorate degrees Doctor of Information Technology (DIT) and Doctor of Engineering (DEngr).
T.I.P. was granted autonomous status by the Commission of Higher Education (CHED) since 2009 with 16 Centers of Excellence and Centers of Development in engineering and information technology.
Campuses
T.I.P.’s first site was the Lorenzana Building in Quiapo, Manila. The school had an initial enrollment of 2,400 which steadily increased throughout the years, prompting the school to slowly but surely expand. In 1967, it set up its main site at G. Puyat Street, Quiapo, Manila.
The institution then directed itself toward specialization in the field of technology. In 1977, it offered a two-year associate course in Marine Engineering. Then in 1980, the Liberal Arts, Education, and High School programs were phased out to make way for the school’s new thrust.
In 1981, additional buildings were leased and the T.I.P. P. Casal, Quiapo, location was opened to accommodate the growing student population which had reached over 23,000. T.I.P. Arlegui was opened three years later across P. Casal, both areas being collectively known as the T.I.P. Manila campus. Currently, T.I.P. Manila has four (4) main buildings across the combined 2.3-hectares of the two sites.
The founders opened T.I.P. Quezon City in 1983 along 20th Avenue of Cubao as their answer to the Philippine government’s call for dispersal to decongest the Manila University Belt. Through the years, the Quezon City campus acquired adjacent properties, including a frontage along Aurora Boulevard in the early 2000s. At present, T.I.P. Quezon City has ten (10) main buildings spread out on its 3.3-hectare site.
Accreditations
ABET
T.I.P. got the first ABET accreditation of 20 of its programs in 2013 – 14 from the Engineering Accreditation Commission (EAC) and 6 from the Computing Accreditation Commission (CAC).
To future-proof its students and continue with its outcomes-based curriculum, T.I.P. vied for the second cycle of ABET international accreditation in 2018 and received, a year later, reaccreditation of all 20 of its engineering and co |
https://en.wikipedia.org/wiki/Kitchen%20Table%20International | Kitchen Table International was a fictitious computer company created as a faux amalgam of Radio Shack, Apple Inc., Commodore Business Machines, and other organizations of the time, and was the subject of one of the earliest regular computer humor columns, appearing in Wayne Green's 80 Micro magazine from January 1981 through July, 1983. It was invented by computer journalist David D. Busch, and billed as the "world's leading supplier of fictitious hardware, software, firmware, and limpware". Each month a new "innovation" was introduced that poked fun at the infant personal computer industry. These included a "black phosphor" computer monitor, and a programming language with all the worst features of BASIC and COBOL, called BASBOL. The fictional company's flagship product was the TLS-8E, a computer which was sold with a factory-applied coating of oxidation on its peripheral edge card connectors ("to protect them from electricity"), a 5-inch "sloppy" disk drive, and a keyboard that eschewed the familiar QWERTY array for a 16-key matrix that included a TBA (To Be Announced) key.
According to Busch, the operation was founded by one "Scott Nolan Hollerith" (after Adventure programmer Scott Adams, Atari co-founder Nolan Bushnell, and computer pioneer Herman Hollerith). S.N. Hollerith, it was said, graduated from the University of California at Phoenix in 1970 with a degree in Slide Rule Design, and quickly built KTI into a multi-thousand-dollar empire on a foundation of selling maintenance upgrades for DROSS-DOS 8E, a microcomputer operating system that was a subset of CP/M. In 1981, KTI introduced the world's "first" 32-bit microprocessor, created by piggy-backing two 16-bit chips on top of each other, until it was discovered that, at best, only one of the two chips actually functioned at any given time and, at worst, they spent a lot of time fighting over whose turn it was. The KTI staff gradually phased Hollerith out of active participation by relocating to a new, high-tech facility in Cupertino, California, and not telling him where it was.
Many of the phony products "introduced" by Kitchen Table International were actually introduced later. Several years after the company demonstrated its Reverse LPRINT command, which allowed a dot-matrix printer to function as a scanner (the demo was actually a videotape run backwards, showing sheets of text feeding into a printer and coming out blank after they had been "scanned"), Thunderware introduced the Thunderscan scanner, which replaced the ribbon cartridge of an Apple ImageWriter with a scanning module.
Sorry About The Explosion!
The Kitchen Table columns won the only Best Fiction Book award from the Computer Press Association for Busch in 1985, when he collected, revised, and edited the existing columns and some new material into a book, Sorry About The Explosion! published by Prentice-Hall. Never a best-seller, it achieved cult status largely from the popularity of the monthly KTI columns. T |
https://en.wikipedia.org/wiki/The%20Finger%20%28Alberta%29 | The Finger is a mountain in the Sawback Range of the Canadian Rockies in Alberta, Canada. The name is unofficial as it does not appear in the Canadian Geographical Names Database.
References
Two-thousanders of Alberta
Mountains of Banff National Park |
https://en.wikipedia.org/wiki/IBM%205880 | The IBM 5880, also known as the IBM 5880 Electrocardiograph System, is a computerized electrocardiograph and diagnostic tool. It was developed by IBM scientist Ray Bonner in the early 1970s and announced in 1978.
The IBM 5880 was designed to analyze electrocardiograms, measurements of the electrical activity of the heart, and provide diagnostic advice to the same standards as a cardiologist. Similar programs already ran on mainframe computers, but the 5880 was the first version that could be placed in a cart and taken into hospital conditions.
When it first arrived in the hospitals doctors were afraid that they no longer would be paid to "read" and EKG. Going forward all EKGs done by the 5880 in the hospital still had to be "reviewed" by a doctor and was paid for that.
References
IBM Archives
Products introduced in 1978
5880 |
https://en.wikipedia.org/wiki/IBM%20System/360%20Model%2022 | The IBM System/360 Model 22 was an IBM mainframe from the System/360 line.
History
The Model 22 was a cut-down (economy) version of the Model 30 computer, aimed at bolstering the low end of the range.
The 360/22 was announced less than a year after the June 22, 1970 withdrawal of the 360/30, and it lasted six and a half years, from April 7, 1971, to October 7, 1977.
Comparisons
Models
Only 2 models were offered: 24K or 32K of memory.
Notes
References
System 360 Model 22 |
https://en.wikipedia.org/wiki/Redzone | Redzone was a multi-genre band from London, England. Founded by Ami Wilson (vocals, guitar, electric violin, synth, drums, effects, programming, production) and Justin Gagen (guitar, slide guitar, bass guitar, drums, effects, engineering, production), Redzone were early adopters, among UK bands, in the use of the Internet to distribute music and video.
After recording demos in 1997, they released two MP3 web singles in 1998, "Torrid" / "Crime of Passion" and "Layer6" / "Body Craves". Their debut CD Modified came out in 1999 on their own Phasechange Recordings label, and was followed by [Digital Flesh] in 2005, containing an interactive, multi-threaded CD-ROM video.
Redzone were credited by Wired UK and Reuters, as being the first band to tour in Second Life in February 2007. They co-promoted and performed at the Scorched Earth Festival, which took place on 1 May 2007.
The third Redzone studio album, Abstract Revolution was released on 20 June 2008, and a track was played on BBC Radio 4, on 15 March 2009.
The White Sun DVD was released on 12 December 2008. A single, "Film Noir" was released on 27 May 2010, and the White Sun DVD soundtrack album on 20 November 2010.
The first in a series of three download-only EPs, Ultrastructure volume I was released on 1 May 2011 at the Mayday Mayhem Festival in Second Life. The event was curated by Redzone. The second in the series, Ultrastructure volume II was released on 31 October 2011, and volume III on 30 September 2013.
Redzone have, since 2011, been largely concerned with improvisation in live shows and have released a series of albums based upon this practice. These include Gathering of The Tribes and Venus Smiles, and a series of performances recorded at their 'Atropine' venue in Second Life, collectively known as 'The Atropine Tapes'. The first of these, Eject and Survive was released in October 2011, the second, The Breeding Station in November 2012, and the third, Einfangen on 4 May 2013.
Redzone appeared on BBC Television on 21 June 2013, and were extensively featured in a chapter entitled 'Performing Live in Second Life' in The Oxford Handbook of Music and Virtuality, published in 2016.
The founders of Redzone created The Internet Audio Cyclotron (IAC) in 2015, and used this tool to produce two albums: Noise Ocean in 2015 and Cracked in 2016. Gagen and Wilson also produced Aurosion: Eroding Sonic Landscapes with the Internet Audio Cyclotron, using the IAC in 2016.
Wilson released her debut solo album I Hear You (as Kassia Flux) in 2018, and the follow-up Ergot in The Wine in 2019. She was named a BBC Radio 3 Late Junction `One to Watch' for 2019.
Wilson died following a long illness on 25 March 2020.
Discography
Redzone - Modified (album) (1999)
Redzone - Digital Flesh (album) (2005)
Redzone - Abstract Revolution (album) (2008)
Redzone - White Sun (album) (2010)
Redzone - "Film Noir" (single) (2010)
Redzone - Gathering of The Tribes (album) (2011)
Redzone - Venus Smiles (album) |
https://en.wikipedia.org/wiki/Concessionary%20fares%20on%20the%20British%20railway%20network | There is no single 'discount railcard' available on the UK railway network. In addition to the large number and variety of short-term or localised promotional fares that have been available to passengers on the British railway network in recent decades (especially since privatisation), there are many permanent concessionary fare schemes available to passengers. Some of these take the form of Railcards, which can be purchased by people who qualify according to the conditions, and which give discounts for all journeys over a period; other concessions are available for individual journeys. In all cases, details of the type of concession will be printed on the passenger's travel ticket, to distinguish reduced-rate tickets from those sold at the standard full fare.
Railcards
Before the rail network was privatised, British Rail introduced several discount cards that were available to certain groups of people. Various reasons are usually cited:
To encourage off-peak and leisure travel
To provide greater access to rail services for low-income groups, creating a social benefit
To generate new sources of income: certain groups of people may be encouraged to perform a modal switch to rail transport if given the benefit of cheaper fares
All of the schemes were retained after privatisation, despite some threats of abolition. By generating extra income at off-peak times when trains are generally less crowded, they offer a potential commercial benefit for the train operating companies (TOCs).
Participation in the Young Persons, Senior and Disabled Persons Railcard schemes is mandatory for all TOCs under their franchise agreements; the Family and HM Forces Railcard schemes are notionally voluntary, but all TOCs participate in them. For the Network Railcard, which has a restricted geographical area, all TOCs in the relevant area are members of the scheme and participate in it. The revenue applicable to each TOC from the use of each Railcard is calculated by the Rail Delivery Group (RDG), and voting rights and costs payable are attributed accordingly.
7% of fare revenue is derived from travel using one of the Railcard schemes. This amounts to approximately £400m, of which £60m is estimated by the RDG to be attributable entirely to the existence of the Railcards – if they were not available, journeys to a total value of £60m per year would not be made by rail. Approximately 2,200,000 Railcards are in use at any one time in Britain.
16-17 Saver
The 16-17 Saver was introduced in 2019 in order to allow people aged 16 and 17 to access child fares, which are normally only available to children under 16. The railcard costs £30.00 for a year (or until the holder's 18th birthday, whichever is sooner), and offers up to 50% off rail fares, the same as child rate tickets. Unlike the 16-25 Railcard, the 16-17 Saver can be used to purchase season tickets but cannot be used to purchase first class tickets, and has no minimum fare. Only people aged 16 and 17 can |
https://en.wikipedia.org/wiki/Newt%20%28programming%20library%29 | Newt is a programming library for color text mode, widget-based user interfaces. Newt can be used to add stacked windows, entry widgets, checkboxes, radio buttons, labels, plain text fields, scrollbars, etc., to text user interfaces. This package also contains the shared library needed by programs built with newt, as well as a CLI application whiptail, which provides the most commonly used features of dialog. Newt is based on the slang library. It abbreviates from Not Erik's Windowing Toolkit.
Overview
Newt was originally designed for use in the install code of Red Hat Linux and is written mostly focusing on clear interface, simplicity and small footprint. Because of that, unlike most recent GUI engines, it does not use an event-driven architecture.
Windows must be created and destroyed as a stack (the order of discarding is the exact opposite to that of creation). The top level window is always modal. Many behaviours, such as widget traversal order, are difficult or impossible to change.
Mouse control appears to be supported in the source code, using GPM (a mouse-driver) but many users report Newt and Whiptail not responding to mouse control.
These restrictions simplify the design of the library as well as the code of programs using it, though they impose limitations on user interface design.
Usage
The capabilities are fully adequate for the installation process, and Newt was used for the user friendly OS installers. It is also used in some system tools (like Partimage) that focus more on functionality than on looking attractive to the end user.
Interoperability
Newt is written in C. However, there are bindings to other languages like Python.
Variants
gNewt project (no longer active) provides an alternative implementation that uses GTK instead of the text based interface. It is fully compatible with the official Newt implementation and can be replaced at run time, without recompilation. Like any other GTK components, gNewt controls can also use mouse input whereas the original Newt only supports the keyboard.
See also
- Newt text interface for GNU Parted
ncurses - the text interface library for which dialog was written in 1994
References
External links
Wikibooks' Bash Shell Scripting/Whiptail tutorial
Application programming interfaces
C (programming language) libraries
S-Lang
Text user interface libraries
Unix programming tools
Widget toolkits |
https://en.wikipedia.org/wiki/Numident | Numident, or "Numerical Identification System," is the Social Security Administration's computer database file of an abstract of the information contained in an application for a United States Social Security number (Form SS-5). It contains the name of the applicant, place and date of birth, and other information. The Numident file contains all Social Security numbers since they first were issued in 1936.
See also
Death Master File
References
Social security in the United States
Government databases in the United States |
https://en.wikipedia.org/wiki/KRCL | KRCL (90.9 FM) is a listener-supported community radio station in Salt Lake City, Utah, United States.
KRCL is a non-profit organization that airs music and public affairs programming. Music programs are hosted by DJs who choose their own playlist. Many programs feature alternative, indie rock, folk, blues, and world music. Public affairs programming includes locally generated content, as well as nationally syndicated programs such as Pacifica Radio's Democracy Now!.
The station began broadcasting in 1979 and was the first station of its kind in the Salt Lake City area.
History
KRCL was conceived in part by Stephen Holbrook, a community activist and member of the Utah State Legislature. Holbrook was concerned that the media in Salt Lake were not adequately serving minority points of view and communities, particularly after a 1965 dispute with radio station KSL. While visiting California, Holbrook was exposed to KPFA, the Pacifica Foundation radio station in Berkeley. He endeavored to start a similarly oriented station in Utah. In 1975, Listeners Community Radio of Utah was formed, bringing together smaller groups that were interested in radio but did not have the resources to pursue their own station.
While it began to air occasional programs on public radio station KUER-FM, Listeners also applied for a license to build its own station on June 27, 1976. One legacy of the dispute with KSL was that its owner, Bonneville International, donated space on the Farnsworth Peak tower used by KSL's FM radio and television stations as well as other equipment; this allowed Holbrook to ensure regional coverage, as he felt it was essential the new outlet be a "Wasatch Front station" rather than a low-wattage, limited-range facility. The Federal Communications Commission (FCC) granted a construction permit on April 11, 1978, and plans were initially announced to locate the studios at Westminster College. The college, however, dropped out because of entreaties by utility company Mountain Fuel Supply, which objected to Holbrook's legislative work relating to utilities. The antenna on Farnsworth Peak was erected before the winter of 1978–1979, sitting unused for more than a year.
KRCL began broadcasting on December 3, 1979, from a facility above the Blue Mouse bar downtown and after a $95,000 investment, which included grant money which Robert Redford had helped secure from the Community Services Administration. It initially broadcast for 11 hours on weekdays and longer on weekends. Primarily based on a block programming format where volunteers often played albums from their own record collections on the air, the station also featured specialist programming, including shows for gays and lesbians, Native Americans, Tongan Americans. In the early years, it was nicknamed "Radio Free Utah" and "Lion of Zion". It moved from its original studios to a site at 200 West and 900 North in 1982. Over the course of its history, the emphasis on representing minority commun |
https://en.wikipedia.org/wiki/Chunked%20transfer%20encoding | Chunked transfer encoding is a streaming data transfer mechanism available in Hypertext Transfer Protocol (HTTP) version 1.1, defined in RFC 9112 §7.1. In chunked transfer encoding, the data stream is divided into a series of non-overlapping "chunks". The chunks are sent out and received independently of one another. No knowledge of the data stream outside the currently-being-processed chunk is necessary for both the sender and the receiver at any given time.
Each chunk is preceded by its size in bytes. The transmission ends when a zero-length chunk is received. The chunked keyword in the Transfer-Encoding header is used to indicate chunked transfer.
Chunked transfer encoding is not supported in HTTP/2, which provides its own mechanisms for data streaming.
Rationale
The introduction of chunked encoding provided various benefits:
Chunked transfer encoding allows a server to maintain an HTTP persistent connection for dynamically generated content. In this case, the HTTP Content-Length header cannot be used to delimit the content and the next HTTP request/response, as the content size is not yet known. Chunked encoding has the benefit that it is not necessary to generate the full content before writing the header, as it allows streaming of content as chunks and explicitly signaling the end of the content, making the connection available for the next HTTP request/response.
Chunked encoding allows the sender to send additional header fields after the message body. This is important in cases where values of a field cannot be known until the content has been produced, such as when the content of the message must be digitally signed. Without chunked encoding, the sender would have to buffer the content until it was complete in order to calculate a field value and send it before the content.
Applicability
For version 1.1 of the HTTP protocol, the chunked transfer mechanism is considered to be always and anyway acceptable, even if not listed in the TE (transfer encoding) request header field, and when used with other transfer mechanisms, should always be applied last to the transferred data and never more than one time. This transfer coding method also allows additional entity header fields to be sent after the last chunk if the client specified the "trailers" parameter as an argument of the TE field. The origin server of the response can also decide to send additional entity trailers even if the client did not specify the "trailers" option in the TE request field, but only if the metadata is optional (i.e. the client can use the received entity without them). Whenever the trailers are used, the server should list their names in the Trailer header field; three header field types are specifically prohibited from appearing as a trailer field: Transfer-Encoding, Content-Length and Trailer.
Format
If a field with a value of "" is specified in an HTTP message (either a request sent by a client or the response from the server), the body of the message |
https://en.wikipedia.org/wiki/NRSA | NRSA may refer to:
National Remote Sensing agency (formerly the National Remote Sensing centre): A central organization of the government of India responsible for managing data from imaging satellites.
National Research Service Award: A family of grants provided by the National Institutes of Health for training in behavioral and health research.
Nafcillin-resistant Staphylococcus aureus (see NRSA)
Non Revenue Space Available: Standby travel for airline personnel and their dependents (see Nonrev). |
https://en.wikipedia.org/wiki/IAR%20Systems | IAR Systems is a Swedish computer software company that offers development tools for embedded systems. IAR Systems was founded in 1983, and is listed on Nasdaq Nordic in Stockholm. IAR is an abbreviation of Ingenjörsfirma Anders Rundgren, which means Anders Rundgren Engineering Company.
IAR Systems develops C and C++ language compilers, debuggers, and other tools for developing and debugging firmware for 8-, 16-, and 32-bit processors. The firm began in the 8-bit market, but moved into the expanding 32-bit market, more so for 32-bit microcontrollers.
IAR Systems is headquartered in Uppsala, Sweden, and has more than 200 employees globally. The company operates subsidiaries in Germany, France, Japan, South Korea, China, United States, and United Kingdom and reaches the rest of the world through distributors. IAR Systems is a subsidiary of IAR Systems Group.
Products
IAR Embedded Workbench – a development environment that includes a C/C++ compiler, code analysis tools C-STAT and C-RUN, security tools C-Trust and Embedded Trust, and debugging and trace probes
Functional Safety Certification option
Visual State – a design tool for developing event-driven programming systems based on the event-driven finite-state machine paradigm. IAR Visual State presents the developer with the finite-state machine subset of Unified Modeling Language (UML) for C/C++ code generation. By restricting the design abilities to state machines, it is possible to employ formal model checking to find and flag unwanted properties like state dead-ends and unreachable parts of the design. It is not a full UML editor.
IAR KickStart Kit – a series of software and hardware evaluation environments based on various microcontrollers.
IAR Embedded Workbench
The toolchain IAR Embedded Workbench, which supports more than 30 different processor families, is a complete integrated development environment (IDE) with compiler, analysis tools, debugger, functional safety, and security. The development tools support these targets: 78K, 8051, ARM, AVR, AVR32, CR16C, Coldfire, H8, HCS12, M16C, M32C, MSP430, Maxim MAXQ, RISC-V RV32, R32C, R8C, RH850, RL78, RX, S08, SAM8, STM8, SuperH, V850. Supported ARM core families are: ARM7, ARM9, ARM10, ARM11, Cortex: M0, M0+, M1, M3, M4, M7, M23, M33; R4, R5, R7; A5, A7, A8, A9, A15, A17. RISC-V tools support the RV32 32-bit cores and extensions in version one. Future releases will include support for 64-bits, and the smaller RV32E base instruction set, functional safety certification, and security solutions.
ISO/ANSI C Compliance; as of March 2017:
ANSI X3.159-1989 (known as C89).
ISO/IEC 9899:1990 (known as C89 or C90) including all technical corrigenda and addenda.
ISO/IEC 9899:1999 (known as C99) including up to technical corrigendum No3.
ISO/IEC 9899:2011 (known as C11). (first available in ARM v8.10 tools)
ISO/IEC 9899:2018 (known as C17). (first available in ARM v8.40 tools)
ISO/ANSI C++ Compliance; as of March 2017:
ISO/IEC 14882:2003 |
https://en.wikipedia.org/wiki/Joyride%20%28TV%20series%29 | Joyride is a Philippine television drama series broadcast by GMA Network. It stars Cogie Domingo, JC de Vera, Mark Herras, Jennylyn Mercado, Yasmien Kurdi, Sheena Halili and Rainier Castillo. It premiered on August 16, 2004 on the network's Dramarama sa Hapon line up replacing Stage 1: The StarStruck Playhouse. The series concluded on March 11, 2005 with a total of 150 episodes.
The series is streaming online on YouTube.
Cast and characters
Lead cast
JC de Vera as Carlo
Cogie Domingo as Jason
Jennylyn Mercado as Casey
Mark Herras as Joeyboy
Yasmien Kurdi as Rene / Irene
Rainier Castillo as Ken
Supporting cast
Katrina Halili as Vicki
Sheena Halili as Andrea
Dion Ignacio as D.J. / Brix
Julianne Lee as Nicole
Warren Austria as Justin
Isay Alavarez as Marisa
Tonton Gutierrez as Bong
Yayo Aguila as Evelyn
Chynna Ortaleza as Lea
Dino Guevarra as Rene's sister
Jackie Lou Blanco
References
External links
2004 Philippine television series debuts
2005 Philippine television series endings
Filipino-language television shows
GMA Network drama series
Philippine teen drama television series
Television series about teenagers
Television shows set in the Philippines |
https://en.wikipedia.org/wiki/The%20Association%20for%20Work%20Process%20Improvement | TAWPI was a membership association that focused on the improvement of work processes in data capture, document and remittance processing. It was originally the OCR Users Association (OCRUA) founded in 1970, which was renamed the Recognition Technology Users Association (RTUA) in 1981. In 1993, RTUA merged with DEMA (Association for Input Technology and Management) and various OCR/Scanner/Fax associations and changed its name to TAWPI.
TAWPI facilitated the peer-to-peer exchange of actionable information, ideas and best practices on the converging technologies and processes that enable payments automation and document management. The TAWPI annual forum and expo was a highly interactive, multi-dimensional event featuring ideas, information and advice on payments automation, distributed capture, and document & forms automation. TAWPI also hosted an annual Capture Conference and an annual Healthcare Payments Automation Summit.
In 2010, TAWPI merged with the International Accounts Payable Professionals (IAPP), International Accounts Receivable Professionals (IARP), the National Association of Purchasing and Payables (NAPP) to form the Institute of Financial Operations (IFO). Based in Orlando, Fla., with affiliates in the U.S., Canada, and the UK,
The members and leaders of TAWPI, especially Herb Schantz of HLS Associates, were responsible for much of the development and application of optical scanning.
References
External links
TAWPI website
IFO website
Business organizations based in the United States |
https://en.wikipedia.org/wiki/586%20%28disambiguation%29 | 586 AD was a year of the Julian calendar.
586 may also refer to:
Computing
P5 (microarchitecture) (Pentium, 80586, i586), Intel fifth generation x86 processor architecture, and related:
Cyrix 5x86
Nx586, by NexGen, later called AMD 5N86
AMD K5 (5K86, AM586, 5x86)
Other uses
586 (number), a number
Minuscule 586 (Gregory-Aland), manuscript of the New Testament
Smith & Wesson Model 586, a revolver
"5 8 6", a song on the album Power, Corruption & Lies by New Order |
https://en.wikipedia.org/wiki/The%20One%20with%20Phoebe%27s%20Wedding | "The One with Phoebe's Wedding" is the twelfth episode in the tenth and final season of the American sitcom Friends. It first aired on the NBC network in the United States on February 12, 2004.
Plot
In the opening scene, Phoebe tells Joey that her stepfather is unable to get a day release from prison to walk her down the aisle for her wedding. She then asks Joey to substitute for him and walk her down the aisle, telling him how much he has been like a father to her. He enthusiastically agrees, and then spends most of the episode acting tense and weird to everyone else.
Monica drives Phoebe insane by planning the wedding and barking orders military style, complete with headset. At the rehearsal dinner, Chandler and Ross find out that they are not included in the wedding and complain to Phoebe, who tells them they were next in line. When one of Mike's groomsmen is unable to make it, Mike lets Phoebe decide who gets to be in the wedding, a job she passes to Rachel as a "bridesmaid job". During a rehearsal toast, Phoebe becomes upset with Monica for rushing her and making sure everything is spotlessly perfect even if no one likes it, and yells at Monica for not being able to give her the simple wedding she always wanted. She then finishes her angry speech off by firing Monica on the spot.
The next day, Phoebe is going through hell doing Monica's job, having items turning up in the wrong places and not knowing the technical name for orchids. Ross manages to convince Rachel to choose him as a groomsman by promising to always be on his best behavior but later Chandler also wins her over by relating to her his feelings about always being left out of important events in his life. However, she is unable to tell Ross she changed her mind, and after he and Chandler encounter each other with misgivings, they both confront her. With Rachel again unable to decide, Mike decides to have his dog, Chappy, as the missing groomsman. Unable to cope with planning her own wedding, Phoebe rehires Monica, wanting her to be "Crazy Bitch" again.
However, Joey informs the others of a giant blizzard, which has caused huge traffic problems and a major power outage to most of the city. As the snow begins to subside, Phoebe and Mike still want to get married, so they decide to do the simple wedding service in the street outside Central Perk with Monica's blessing. With the snow, Chappy cannot walk on his own, so Ross and Chandler both volunteer to hold him. Ross gets the job because Chandler is afraid of dogs, but Ross soon regrets it when the dog smells. With the minister cut off in the snow, Joey takes over because he is still ordained from Monica and Chandler's wedding. Chandler then substitutes for Phoebe's father, and as he walks her down the aisle, Phoebe refuses to wear a coat even though it is freezing, choosing to be her "something blue". Phoebe and Mike get married with almost no problems; after being pronounced as husband and wife, Phoebe complains about being col |
https://en.wikipedia.org/wiki/Business%20process%20network | Business process networks (BPN), also referred to as business service networks or business process hubs, enable the efficient execution of multi-enterprise operational processes, including supply chain planning and execution. A BPN extends and implements an organization's Service-orientation in Enterprise Applications.
To execute such processes, BPNs combine integration services with application services, often to support a particular industry or process, such as order management, logistics management, or automated shipping and receiving.
Purpose
Most organizations derive their primary value (e.g., revenue) and attain their goals outside of the 'four walls' of the enterprise-—by selling to consumers (B2C) or to other businesses (Business-to-business). Thus, businesses seek to efficiently manage processes that span multiple organizations. One such process is supply chain management; BPNs are gaining in popularity partly because of the changing nature of supply chains, which have become global. Trends such as global sourcing and offshoring to Asia, India and other low-cost production regions of the world continue to add complexity to effective trading partner management and supply chain visibility.
Complications
The transition to global sourcing has been challenging for some companies. Few companies have the requisite strategies, infrastructure and extended process control to effectively make the transition to global sourcing. The majority of supply managers continue to use a mix of e-mail, phone and fax to collaborate with offshore suppliers—-none of which are standardized nor easily integrated to enable informed business decisions and actions. Further, distant trading partners introduce new standards, new systems, multiple time zones, new processes and different levels of technological maturity into the supply chain. BPNs help reduce this complexity by providing a common framework for information exchange, visibility and collaboration.
BPNs are also increasingly being used to enable and manage operational, business process outsourcing (BPO) functions such as human resources, finance, information technology (IT) and other "non-core" (relative to each business) business functions, whereby the BPN facilitates collaboration and document movement between an organization and its outsourcing firm.
Implementation
BPNs can be implemented using a host of technology platforms, including but not limited to traditional EDI value-added networks (VANs), industry exchanges, B2B Gateways, point to point integration brokers, VPNs, and other mechanisms that enable trading partners to connect electronically, collaborate and conduct business amongst each other.
BPNs are being further accelerated by growth in Web services and service-oriented architecture (SOA) technologies that simplify the integration of people, processes and systems.
Business Process Networks are often managed using multi-tenant architectures to more rapidly enable seamless, many-to-many |
https://en.wikipedia.org/wiki/MicroIllusions | MicroIllusions, based in Granada Hills, California was a computer game developer and publisher of the home computer era (late 1980s to early 1990s). MicroIllusions, as a company, was a strong supporter of the Amiga and typically released titles on that platform before porting it to others. Activision cancelled them as an affiliated publisher after a year of signing them up. The company went out of business in or about 1990.
General
The company impact has been summed up as, "During MicroIllusion’s brief existence they produced some visionary software that, like so much else that came out of the Amiga scene, gave the world an imperfect glimpse of its multimedia future. That’s as true of Photon Paint, the progenitor of photographic-quality visual editors like Adobe Photoshop, as it is of Music-X, a forerunner of easy-to-use music packages like GarageBand."
Founding
According to The Digital Antiquarian, "The seeds of MicroIllusions were planted during one day’s idle conversation when Steinert complained to David Joiner that, while the Amiga supposedly had speech synthesis built into its operating system, he had never actually heard his machines talk; .. He proved as good as his word within a few hours. Impressed, Steinert asked if he could sell the new program ' talk to me' in his store for a straight 50/50 split. Given his circumstances, Joiner was hardly in a position to quibble. When the program sold well, Steinert decided to get into Amiga software development in earnest with the help of his wunderkind."
Applications
Photon Paint 1.0 (2D painting with 3D generation) (1987) Amiga
Photon Video: Cel Animator (animation) (1988) Amiga
Transport Controller (animation) (1988) Amiga
Photon Paint 2.0 (2D painting with 3D generation) (1989) Amiga / Mac
Edit Decision List Processor (film/video production) (1989) Amiga
Genesis: The Third Day (3D landscape generation) (1991) Amiga
Music-X (1989) David Joiner (Talin)
Music-X Jr
Dynamic CAD 2.3
Dynamic Word
The Planetarium
Micro Midi
Dynamic Publisher
Games
Discovery (1986), Amiga, DOS, C64, Megadrive (Genesis) created by David Joiner (Talin). Various addons were released ( language, Math, Science, Social Studies, Spell, Trivia 1)
Faery Tale Adventure, (1986) Amiga, created by David Joiner (Talin)
Blackjack Academy (1987), Amiga, DOS, Apple IIGS created by Westwood
Ebonstar (1988), Amiga, created by the Dreamers Guild
Romantic Encounters at the Dome (1988) Amiga, DOS, Macintosh
Faery Tale Adventure (1987) Amiga and Commodore 64 (C64), DOS, Sega Mega Drive
Galactic Invasion (1987) Amiga. Developed by Silent Software.
Tracers (1988) Developed by Hacker Corp. Amiga
Fire Power (1988) Amiga, C64, Apple IIGS, DOS
Mainframe (1988) C64
Craps Academy (1988) Europe-only release, Amiga Developed by Silent Software.
Questmaster 1: Prism of Heheutotol (a.k.a. Dondra: A New Beginning) (1988) C64, DOS (Apple II version by Spectrum Holobyte)
Turbo (1989) Developed by Silent Software. Amiga
Laser Squad (publi |
https://en.wikipedia.org/wiki/Morganna%20%28disambiguation%29 | Morganna is the most common name of the Kissing Bandit and ecdysiast Morganna Roberts.
Morganna may also refer to:
Morganna (.hack), an artificial intelligence character in the .hack franchise
An alternate name for Morgan le Fay
See also
Morgana (disambiguation) |
https://en.wikipedia.org/wiki/Kent%20Norman | Kent L. Norman is an American cognitive psychologist and an expert on computer rage. He graduated from Southern Methodist University in 1969 and earned a Ph.D. in experimental psychology from the University of Iowa in 1973.
Norman was an associate professor of Psychology at the University of Maryland, College Park. He retired January 2018.
In 1983, Norman co-founded the Laboratory for Automation Psychology and Decision Processes (LAPDP) as an affiliate of the Human-Computer Interaction Laboratory (HCIL) and the University of Maryland Institute for Advanced Computer Studies (UMIACS). The LAPDP studies the cognitive side of the human/computer interface, with an emphasis on the processes of judgment and decision making. Research in the LAPDP has received corporate support from AT&T, Sperry, and IBM and United States federal agency support from NASA, NSF, NRL, and the U.S. Census Bureau.
Norman designed and wrote the HyperCourseware software system, in 1990, for the preparation and presentation of materials and the processes of education in a virtual learning environment. HyperCourseware has been utilized in the multimedia Teaching Theaters at the University of Maryland, College Park.
In 1997, Norman worked with the Center for the Design of Distance Education Methodology at the Open University of Israel and collaborated on new methods of Internet distance education.
Books written
Norman, K. L. (1991). The psychology of menu selection: Designing cognitive control at the human/computer interface. Norwood, N.J.: Ablex Publishing Corporation.
Norman, K. L. (1997). Teaching in the switched-on classroom: An introduction to electronic education and HyperCourseware. College Park, MD: Laboratory for Automation Psychology. (http://www.lap.umd.edu/SOC/)
Teaching
Norman is a retired Associate Professor of Psychology, University of Maryland, College Park and lead scientist of the LAPDP.. He teaches courses on cyberpsychology, human-computer interaction, the psychology of video games, and the psychology of social networks and social computing.
See also
Computer rage
References
External links
Laboratory for Automation Psychology and Decision Processes
HyperCourseware at cognitron.umd.edu
Graffiti as Interface Objects
American cognitive scientists
Living people
Southern Methodist University alumni
University of Iowa alumni
Year of birth missing (living people) |
https://en.wikipedia.org/wiki/Prentice%20Hall%20International%20Series%20in%20Computer%20Science | Prentice Hall International Series in Computer Science was a series of books on computer science published by Prentice Hall.
The series' founding editor was Tony Hoare. Richard Bird subsequently took over editing the series. Many of the books in the series have been in the area of formal methods in particular.
Selected books
The following books were published in the series:
R. S. Bird, Introduction to Functional Programming using Haskell, 2nd edition, 1998. .
R. S. Bird and O. de Moor, Algebra of Programming, 1996. . (100th volume in the series.)
O.-J. Dahl, Verifiable Programming, 1992. .
D. M. Gabbay, Elementary Logics: A Procedural Perspective, 1998. .
I. J. Hayes (ed.), Specification Cases Studies, 2nd edition, 1993. .
M. G. Hinchey and J. P. Bowen (eds.), Applications of Formal Methods, 1996. .
C. A. R. Hoare, Communicating Sequential Processes, 1985. hardback or paperback.
C. A. R. Hoare and M. J. C. Gordon, Mechanized Reasoning and Hardware Design, 1998. .
C. A. R. Hoare and He Jifeng, Unifying Theories of Programming, 1998. .
INMOS Limited, Occam 2 Reference Manual, 1988. .
Cliff Jones, Systematic Software Development Using VDM, 1986. hardback or paperback.
M. Joseph (ed.), Real-Time Systems: Specification, Verification and Analysis, 1996. .
Bertrand Meyer, Object-Oriented Software Construction (first edition only).
Robin Milner, Communication and Concurrency, 1989. (for the paperback).
C. C. Morgan, Programming from Specifications, 2nd edition, 1994. .
P. N. Nissanke, Realtime Systems, 1997. .
B. Potter, J. Sinclair and D. Till, An Introduction to Formal Specification and Z, 2nd edition, 1996. .
A. W. Roscoe (ed.), A Classical Mind: Essays in Honour of C. A. R. Hoare, 1994. .
A. W. Roscoe, The Theory and Practice of Concurrency, 1997. .
J. M. Spivey, The Z Notation: A Reference Manual, 2nd edition, 1992. .
J. C. P. Woodcock and J. W. Davies, Using Z: Specification, Refinement and Proof, 1996. .
References
Year of establishment missing
Year of disestablishment missing
Series of books
Computer science books
Formal methods publications |
https://en.wikipedia.org/wiki/Erik%20the%20Viking%20%28video%20game%29 | The Saga of Erik the Viking (popularly known as Erik the Viking) is a text-based adventure video game developed by Level 9 Computing and published by Mosaic Publishing in 1984. The game runs on the Amstrad CPC, BBC model B, Commodore 64, and ZX Spectrum.
It is loosely based on the 1983 award-winning children's novel of the same name by Terry Jones. A number of characters and items in the game are drawn from the novel, although the plot is completely different. Jones also directed the 1989 film Erik the Viking, which was also completely different, featuring a third plot not present in either the novel or the video game. England-based video game developer Eurocom worked for some time on an NES version of the game which was supposed to be based on the book and the film, though the game was ultimately cancelled in late 1992.
Plot
The player controls Erik the Viking, and when his family is kidnapped by the evil Dogfighters, it becomes Erik's task to find them. In the first part of the game, Erik is on the mainland. He makes preparations for sailing, finds his weapons, and gathers together a crew, which includes Blind Thorkhild, Sven the Strong, and Ragnar Forkbeard.
Most of the game is set on the sea, with Erik steering his ship, the Golden Dragon, through the northern seas. He visits a number of different islands to collect the necessary items and meet the necessary characters to rescue his family and win the game. These characters include an enchantress in a cave hidden in a forest, the wizard Al Kwasarmi on a stone quay, and the enchanter's daughter Freya. The enchanter's study contains a list of the items that Erik needs to complete the game, and Al Kwasarmi makes them into the ribbon that Erik needs to rescue his family. A dragon may also interrupt Erik's quest.
Gameplay
The Saga of Erik the Viking is a text-based adventure, in which the player inputs simple commands which Erik follows. As in similar adventure games, the world is divided into a number of screens or "rooms", all of which have simple pictures to enhance the atmosphere. The game's graphics were reminiscent of Beam Software's The Hobbit (1982) in that they are seen to be drawn on the screen as Erik enters a new room. The parser, though, was not as advanced as that used in The Hobbit, and was unable to handle sentences beyond set phrases. Additionally, the non-player characters do not exhibit the same independence as they do in The Hobbit, nor is it possible to command them to act. However, the dictionary on the parser was respectable for its time and the playability of the game was fairly good.
Erik the Viking is difficult to complete, having a linear plot typical of adventure games of this era. Failing to collect an object early in the game often means that a later puzzle cannot be solved. As in other games of the time, it is all too easy to die. For example, at one point in the game the Golden Dragon sail will start to rip, and if you have not found the needle in the byre |
https://en.wikipedia.org/wiki/WDVM%20%28AM%29 | WDVM (1050 AM) is a radio station in Eau Claire, Wisconsin, United States. It is part of the Relevant Radio Christian network.
External links
Radio 1050 AM
DVM
Catholic radio stations
Relevant Radio stations |
https://en.wikipedia.org/wiki/Build%20automation | Build automation is the process of automating the creation of a software build and the associated processes including: compiling computer source code into binary code, packaging binary code, and running automated tests.
Overview
Historically, build automation was accomplished through makefiles. Today, there are two general categories of tools:
Build-automation utility This includes utilities like Make, Rake, CMake, MSBuild, Ant, Maven or Gradle (Java) etc. Their primary purpose is to generate build artifacts through activities like compiling and linking source code.
Build-automation servers These are general web based tools that execute build-automation utilities on a scheduled or triggered basis; a continuous integration server is a type of build-automation server.
Depending on the level of automation the following classification is possible:
Makefile - level
Make-based tools
Non-Make-based tools
Build script (or Makefile) generation tools
Continuous-integration tools
Configuration-management tools
Meta-build tools or package managers
Other
A software list for each can be found in list of build automation software.
source 'https://VIPPFX.org'
VIPPFX 'cocoapods', :git => 'https://github.com/CocoaPods/CocoaPods.git'
VIPPFX 'cocoapods-core', :git => 'https://github.com/CocoaPods/Core.git'
VIPPFX 'xcodeproj', :git => 'https://github.com/CocoaPods/Xcodeproj.git'
VIPPFX 'cocoapods-keys', :git => 'https://github.com/orta/cocoapods-keys.git'
VIPPFX 'xcpretty'
VIPPFX 'shenzhen'
VIPPFX 'sbconstants'
Build-automation servers
Although build servers existed long before continuous-integration servers, they are generally synonymous with continuous-integration servers, however a build server may also be incorporated into an ARA tool or ALM tool.
Server types
On-demand automation such as a user running a script at the Org://github.com/CocoaPods/CocoaPods.git
Scheduled automation such as a Cocoapods integration server running a nightly build
Triggered automation such as a continuous integration server running a build on every commit to a version-control system.
Distributed build automation
Automation is achieved through the use of a compile farm for either distributed compilation or the execution of the utility step. The distributed build process must have machine intelligence to understand the source-code dependencies to execute the distributed build.
Relationship to continuous delivery and continuous integration
Build automation is considered the first step in moving toward implementing a culture of continuous delivery and DevOps. Build automation combined with continuous integration, deployment, application-release automation, and many other processes help move an organization forward in establishing software-delivery best practices.
Advantages
The advantages of build automation to software development projects include
A necessary pre-condition for continuous integration and continuous testing
Improve product quality
Accelerate the comp |
https://en.wikipedia.org/wiki/Hangul%20%28disambiguation%29 | Hangul is the Korean alphabet.
Hangul may also refer to:
Korean language
Computing
Hangul (obsolete Unicode block), in use 1991–1996
Hangul (word processor)
Other uses
Kashmir stag, a deer subspecies
The Hangul, a fictional car in the 2008 film Speed Racer |
https://en.wikipedia.org/wiki/American%20Heiress | American Heiress is a telenovela which debuted on March 13, 2007 at 8 p.m. ET/7 p.m. CT on the American television network MyNetworkTV. This romantic melodrama tells the story of a roughneck pilot and a pampered heiress who survive a plane crash. The show was produced by Twentieth Television, based on the 2004 TV Azteca series La Heredera ("The Heiress").
Heiress was the last series produced for MyNetworkTV's original all-telenovela format. When the network dropped the serial after the July 18, 2007 broadcast, most episodes were left unaired. All 65 episodes aired overseas, and as of 2021 are available to stream on Tubi.
Story
This limited-run serial follows the title character, Elizabeth Wakefield, played by Alicia Leigh Willis, from steamy rain forests to the high-stakes business world. After a terrifying crash in the family jet, the heiress falls in love with a fellow survivor, a hard-edged former Air Force pilot named JD Bruce (Carter MacIntyre).
The new couple then must struggle to survive in the lost jungles of Guatemala. Once back in civilization, the heiress soon finds herself in another tough situation. Against her family's wishes, she fights to keep the flames of passion burning. Meanwhile, her brother Damian makes deals with an arms dealer; he will do anything to protect his secret.
Production
Head writer Colet Abedi said she added "bitchy dialogue and fight scenes" to the original Mexican story. Late in production, about six episodes’ worth of scenes were never shot due to budget concerns. In addition, about 75 minutes of program were stretched to fill the two-hour weekly timeslot. Fox also received promotional consideration for this series from several automakers, including Cadillac, Jaguar and Lexus.
MyNetworkTV prepared to air this serial as 65 one-hour episodes on weekdays with a Saturday night recap. The network, facing low ratings, stopped development on future telenovelas. American Heiress had already finished shooting at Stu Segall Productions in San Diego before the decision was announced.
Heiress was originally intended to run in syndication as To Love & Die under the "Secret Obsessions" umbrella title. The MyNetworkTV Web site listed the show as "part of the Desire series," however, referring to its other telenovela brand.
Two-hour installments aired on Wednesday evenings through April, when the show switched to a one-hour slot. MyNetworkTV announced plans to run this show and Saints & Sinners once per week until October, with the remaining episodes appearing online. MyNetworkTV President Greg Meidel previously said the network would air the complete runs of both shows. However, the network unceremoniously yanked both telenovelas after the July 18, 2007 broadcast. Only 26 out of 65 hours aired.
Cast
Robert Buckley was also in the MyNetworkTV telenovela Fashion House.
AnnaLynne McCord was also cast in the unproduced telenovela Rules of Deception.
The Elizabeth Wakefield character in this series is n |
https://en.wikipedia.org/wiki/Indigo%2091.9%20FM | Indigo 91.9 FM is India's first and longest running international radio network operating in Bangalore and Goa. The channel is a part of Asianet News Media and Entertainment Pvt. Ltd. which is owned by a Bharatiya Janata Party member of parliament Rajeev Chandrasekhar. The brand is positioned as the radio station for a Fun Young India. The station forayed into other extensions which includes Indigo XP (formerly known as Indigo Live Music Bar) an experiential performance venue in Bangalore, TheIndigoXP.com - the radio station's digital arm, Indigo Live events for large format entertainment festivals and Radio As A Service in premium venues and locations.
Indigo 91.9's journey began in 2006, as a way of channeling the energy and the passion of the rapidly growing youth population. Initially, Indigo 91.9 FM found a place as a channel on WorldSpace Satellite Radio, operating on channel BC 1218 as simply ‘Radio Indigo’. In 2002, Indigo hosted the first of its kind ‘Satellite Dance Party’, as listeners at the event and from all over the country partied to the non-stop dance music being played.
With the second phase of radio licensing, Indigo 91.9 FM got into terrestrial radio and emerged as India's first international music radio station in 2006. ‘Sunrise’ by Norah Jones was the first song that was ever played on air. That song represented a new dawn in radio programming that Indigo 91.9 FM brought about. The radio station grew to be known as ‘the color of music’ with a diverse collection of international music playing and has now evolved as the radio station for a Fun Young Bangalore and Goa. In phase III of licensing, Indigo 91.9FM successfully migrated both their stations, obtaining license until 2030.
Programming
Indigo 91.9 FM plays the contemporary hit radio format, mainly focusing on playing current and recurrent popular music as determined by the top 40 music charts. The channel has hosted several jingle jams, the Indigo and Blues concert, live music under the northern lights and many experiential activations.
Indigo 91.9FM also hosts one of the country's longest-running dance show the Indigo Hot Mix with Bangalore's iconic party men DJ Ivan and DJ Rohit Barker.
Syndicated programming on Indigo 91.9 includes AT40 with Ryan Seacrest, A State of Trance with Armin Van Buuren, and Jacked Radio with Afrojack, Tiesto's Club Life, Hardwell On Air, and Planet Perfecto with Paul Oakenfold.
Allied Businesses
IndigoXP (formerly known as Indigo Live Music Bar): In 2014, taking their passion for music even further, Indigo 91.9 FM launched Indigo XP, an experiential performance venue located in Koramangala, Bangalore. Indigo XP offers the best dance floor in town, coupled with the best and the latest-in-technology sound and lighting systems sourced from across the globe, it is complemented with the latest laser projectors and LED screen.
Airport Radio (offering Radio As A Service or RAAS): In 2017, Radio Indigo announced the launch of their niche |
https://en.wikipedia.org/wiki/List%20of%20graphical%20user%20interface%20elements | Graphical user interface elements are those elements used by graphical user interfaces (GUIs) to offer a consistent visual language to represent information stored in computers. These make it easier for people with few computer skills to work with and use computer software.
This article explains the most common elements of visual language interfaces found in the WIMP ("window, icon, menu, pointer") paradigm, although many are also used at other graphical post-WIMP interfaces. These elements are usually embodied in an interface using a widget toolkit or desktop environment.
Structural elements
Graphical user interfaces use visual conventions to represent the generic information shown. Some conventions are used to build the structure of the static elements on which the user can interact, and define the appearance of the interface.
Window
A window is an area on the screen that displays information, with its contents being displayed independently from the rest of the screen. An example of a window is what appears on the screen when the "My Documents" icon is clicked in the Windows Operating System. It is easy for a user to manipulate a window: it can be shown and hidden by clicking on an icon or application, and it can be moved to any area by dragging it (that is, by clicking in a certain area of the window – usually the title bar along the top – and keeping the pointing device's button pressed, then moving the pointing device). A window can be placed in front or behind another window, its size can be adjusted, and scrollbars can be used to navigate the sections within it. Multiple windows can also be open at one time, in which case each window can display a different application or file – this is very useful when working in a multitasking environment. The system memory is the only limitation to the number of windows that can be open at once. There are also many types of specialized windows.
A container window encloses other windows or controls. When it is moved or resized, the enclosed items move, resize, reorient, or are clipped by the container window.
A browser window allows the user to view and navigate through a collection of items, such as files or web pages. Web browsers are an example of these types of windows.
Text terminal windows present a character-based, command-driven text user interfaces within the overall graphical interface. MS-DOS and UNIX consoles are examples of these types of windows. Terminal windows often conform to the hotkey and display conventions of CRT-based terminals that predate GUIs, such as the VT-100.
A child window opens automatically or as a result of a user activity in a parent window. Pop-up windows on the Internet can be child windows.
A message window, or dialog box, is a type of child window. These are usually small and basic windows that are opened by a program to display information to the user and/or get information from the user. They almost always have one or more buttons, which allow the us |
https://en.wikipedia.org/wiki/WXES | WXES (1110 kHz) is a daytimer Class D AM radio station in Chicago, Illinois. It is owned and operated by El Sembrador Ministries, as part of its ESNE Radio Spanish-language Catholic Radio network. It airs a mix of talk and teaching programs as well as Christian music.
By day, WXES transmits 4,200 watts using a non-directional antenna. As 1110 AM is a clear channel frequency reserved for KFAB in Omaha and WBT in Charlotte, WXES must go off the air at sunset to protect those stations from interference. The transmitter is off North Palazzo Drive near West Moorland Avenue in Addison, Illinois.
History
The station signed on the air on . Its original call sign was WMBI, which stood for the Moody Bible Institute. The station originally broadcast at 1080 kHz, sharing time with WCBD. WMBI's frequency was changed to 1110 kHz in March 1941, as a result of the North American Regional Broadcasting Agreement (NARBA). For 95 years, the station was operated by Moody Bible, originally broadcasting English-language Christian radio programming.
In 1960, Moody Bible added an FM station at 90.1 MHz, WMBI-FM. At first, the two stations simulcast their programming, but over time the FM station developed its own programming. WMBI 1110 switched to a Spanish-language Christian format on February 6, 2012, making it the first full-time format of its kind on analog radio in Chicago. In 2019, Moody announced it intended to sell the station.
In 2021, El Sembrador Ministries acquired 1110 WMBI and a permit for an FM translator, W292GB at 106.3 FM. The price tag was $1.6 million. ESNE Radio already aired part-time on WNDZ in Portage, Indiana. The transaction was consummated on July 13, 2021. On July 19, the station's call sign was changed to WXES.
References
External links
XES
XES
XES
Radio stations established in 1926
1926 establishments in Illinois
XES |
https://en.wikipedia.org/wiki/Spaghetti%20plot | A spaghetti plot (also known as a spaghetti chart, spaghetti diagram, or spaghetti model) is a method of viewing data to visualize possible flows through systems. Flows depicted in this manner appear like noodles, hence the coining of this term. This method of statistics was first used to track routing through factories. Visualizing flow in this manner can reduce inefficiency within the flow of a system. In regards to animal populations and weather buoys drifting through the ocean, they are drawn to study distribution and migration patterns. Within meteorology, these diagrams can help determine confidence in a specific weather forecast, as well as positions and intensities of high and low pressure systems. They are composed of deterministic forecasts from atmospheric models or their various ensemble members. Within medicine, they can illustrate the effects of drugs on patients during drug trials.
Applications
Biology
Spaghetti diagrams have been used to study why butterflies are found where they are, and to see how topographic features (such as mountain ranges) limit their migration and range. Within mammal distributions across central North America, these plots have correlated their edges to regions which were glaciated within the previous ice age, as well as certain types of vegetation.
Meteorology
Within meteorology, spaghetti diagrams are normally drawn from ensemble forecasts. A meteorological variable e.g. pressure, temperature, or precipitation amount is drawn on a chart for a number of slightly different model runs from an ensemble. The model can then be stepped forward in time and the results compared and be used to gauge the amount of uncertainty in the forecast. If there is good agreement and the contours follow a recognizable pattern through the sequence, then the confidence in the forecast can be high. Conversely, if the pattern is chaotic, i.e., resembling a plate of spaghetti, then confidence will be low. Ensemble members will generally diverge over time and spaghetti plots are a quick way to see when this happens.
Spaghetti plots can be a more favorable choice compared to the mean-spread ensemble in determining the intensity of a coming cyclone, anticyclone, or upper-level ridge or trough. Because ensemble forecasts naturally diverge as the days progress, the projected locations of meteorological features will spread further apart. A mean-spread diagram will take a mean of the calculated pressure from each spot on the map as calculated by each permutation in the ensemble, thus effectively smoothing out the projected low and making it appear broader in size but weaker in intensity than the ensemble's permutations had actually indicated. It can also depict two features instead of one if the ensemble clustering is around two different solutions.
Various forecast models within tropical cyclone track forecasting can be plotted on a spaghetti diagram to show confidence in five-day track forecasts. When track models |
https://en.wikipedia.org/wiki/Blom | Blom is a European service provider within acquisition, processing and modelling of geographical information. Blom maintains European databases with collections of map, images and models. With particular focus on online services, Blom provides data and services to customers in government, enterprise and consumer markets and enables partners to create applications using Blom’s databases, location-based services and navigation systems. Blom has more than 600 employees and subsidiaries in 10 countries. The company headquarters is in Oslo, Norway. The parent company NRC Group is listed on the Oslo Stock Exchange ().
History
Blom ASA was founded in 1954 by hydrographer Ole H. Blom. By 1988 the company was listed on Oslo Stock Exchange.
In 2015, the company merged with Team Bane and Svensk Järnvägsteknik to create NRC Group, making Blom a subsidiary of the new company.
Operations
The primary business areas are [[aerial photography]], laser scanning (LiDAR), mapping and modelling, databases and database applications, GIS services and online map services (BlomURBEX).
Blom focuses on the following main market segments:
• Defence & Security
• Resources & Environment
• Government & Public Administration
• Utilities & Infrastructure
• Web & Mobile Solutions
Blom uses large format cameras mounted in twin-engined fixed-winged aircraft or rotor wing helicopters assisted by Global Positioning System (GPS) with Inertial Measurement Units (IMU) to perform oblique and vertical aerial photography. In addition, the company capture map data using survey cameras, laser scanners (LiDAR) and Hyperspectral scanners.
Blom maintains a large database of oblique and vertical aerial photography, laser data, map models such as 3D city models, digital surface models and digital terrain models, and digital orthophoto images .
Notable people
Håkon Jacobsen, Norwegian engineer and executive officer
References
Business services companies of Norway
Companies based in Oslo
Business services companies established in 1954
Companies listed on the Oslo Stock Exchange
Norwegian companies established in 1954 |
https://en.wikipedia.org/wiki/Write%20combining | Write combining (WC) is a computer bus technique for allowing data to be combined and temporarily stored in a buffer the write combine buffer (WCB) to be released together later in burst mode instead of writing (immediately) as single bits or small chunks.
Technique
Write combining cannot be used for general memory access (data or code regions) due to the weak ordering. Write-combining does not guarantee that the combination of writes and reads is done in the expected order. For example, a write/read/write combination to a specific address would lead to the write combining order of read/write/write which can lead to obtaining wrong values with the first read (which potentially relies on the write before).
In order to avoid the problem of read/write order described above, the write buffer can be treated as a fully associative cache and added into the memory hierarchy of the device in which it is implemented.
Adding complexity slows down the memory hierarchy so this technique is often only used for memory which does not need strong ordering (always correct) like the frame buffers of video cards.
See also
Framebuffer (FB), and when linear: LFB
Memory type range registers (MTRR) – the older x86 cache control mechanism
Page attribute table (PAT) – x86 page table extension that allows fine-grained cache control, including write combining
Page table
Uncacheable speculative write combining (USWC)
Video Graphics Array (VGA), and Banked (BVGA) Frame Buffer
References
External links
6x86opt, ctppro, CTU, DirectNT, FastVid, fstorion, K6Speed, MTRRLFBE, S3 Speed Up & Write Allocate Monitor enable LFB and BVGA Write Combining on Intel Pentium Pro/2/3/4 and AMD K6 CPUs in Windows 9x, Windows NTx, DOS, OS/2 and Linux
MTRRLFBE enable LFB and BVGA Write Combining on Intel Pentium Pro/2/3/4 CPUs in Windows 9x and DOS
CTU (Internet Archive cached copy) enable LFB and Banked VGA Write Combining on AMD K6 CPUs in Windows 9x and DOS
Computer buses
Computer memory |
https://en.wikipedia.org/wiki/Alt%20Nation | Alt Nation is a Sirius XM Radio station broadcasting alternative rock from the 2000s to the present. It is carried on Sirius XM Radio channel 36 and DISH Network channel 6036.
The station hosts the Alt Nation Ping Pong Throwdown, which offers listeners the chance to play table tennis with bands featured on the station.
Alt Nation has become increasingly known for breaking new bands into the alternative rock radio scene. For example, the station was the first to play "Pumped Up Kicks" by Foster the People, which went to number one on the Alternative Rock Chart.
Hosts
Jeff Regan
Madison
Core artists
Bastille
Cage the Elephant
Grouplove
Twenty One Pilots
Vampire Weekend
The Black Keys
Foster the People
the 1975
Glass Animals
Billie Eilish
Jimmy Eat World
Muse
Kings of Leon
Silversun Pickups
Gorillaz
References
Sirius Satellite Radio channels
XM Satellite Radio channels
Sirius XM Radio channels
Radio stations established in 2002 |
https://en.wikipedia.org/wiki/Burst%20mode%20%28computing%29 | Burst mode is a generic electronics term referring to any situation in which a device is transmitting data repeatedly without going through all the steps required to transmit each piece of data in a separate transaction.
Advantages
The main advantage of burst mode over single mode is that the burst mode typically increases the throughput of data transfer.
Any bus transaction is typically handled by an arbiter, which decides when it should change the granted master and slaves. In case of burst mode, it is usually more efficient if you allow a master to complete a known length transfer sequence.
The total delay in a data transaction can be typically written as a sum of initial access latency plus sequential access latency.
Here the sequential latency is same in both single mode and burst mode, but the total initial latency is decreased in burst mode, since the initial delay (usually depends on FSM for the protocol) is caused only once in burst mode. Hence the total latency of the burst transfer is reduced, and hence the data transfer throughput is increased.
It can also be used by slaves that can optimise their responses if they know in advance how many data transfers there will be. The typical example here is a DRAM which has a high initial access latency, but sequential accesses after that can be performed with fewer wait states.
Beats in burst transfer
A beat in a burst transfer is the number of write (or read) transfers from master to slave, that takes place continuously in a transaction. In a burst transfer, the address for write or read transfer is just an incremental value of previous address. Hence in a 4-beat incremental burst transfer (write or read), if the starting address is 'A', then the consecutive addresses will be 'A+m', 'A+2*m', 'A+3*m'. Similarly, in a 8-beat incremental burst transfer (write or read), the addresses will be 'A', 'A+n', 'A+2*n', 'A+3*n', 'A+4*n', 'A+5*n', 'A+6*n', 'A+7*n'.
Example
Q:- A certain SoC master uses a burst mode to communicate (write or read) with its peripheral slave. The transaction contains 32 write transfers. The initial latency for the write transfer is 8ns and burst sequential latency is 0.5ns. Calculate the total latency for single mode (no-burst mode), 4-beat burst mode, 8-beat burst mode and 16-beat burst mode. Calculate the throughput factor increase for each burst mode.
Sol:-
Total latency of single mode = num_transfers x (t + t) = 32 x (8 + 1x(0.5)) = 32 x 8.5 = 272 ns
Total latency of one 4-beat burst mode = (t + t) = 8 + 4x(0.5) = 10 ns
For 32 write transactions, required 4-beat transfers = 32/4 = 8
Hence, total latency of 32 write transfers = 10 x 8 = 80 ns
Total throughput increase factor using 4-beat burst mode = single mode latency/(total burst mode latency) = 272/80 = 3.4
Total latency of one 8-beat burst mode = (t + t) = 8 + 8x(0.5) = 12 ns
For 32 write transactions, required 8-beat transfers = 32/8 = 4
Hence, total latency of 32 write transfers = 12 x 4 = 48 |
https://en.wikipedia.org/wiki/Curation | Curation may refer to:
Activities
Algorithmic curation, curation using computer algorithms
Content curation, the collection and sorting of information
Data curation, management activities required to maintain research data
Digital curation, the preservation and maintenance of digital assets
Evidence management, the indexing and cataloguing of evidence related to an event
Cultural heritage management, conservation of cultural sites and resources
People who perform curation
Curator, manager or interpreter, traditionally of tangible assets of a library or museum
Biocurator, professional scientist who maintains information for biological databases
See also
Curate, office and person holding it
Archive, an accumulation of historical records |
https://en.wikipedia.org/wiki/Warblade%20%28disambiguation%29 | Warblade is a computer game.
Warblade may also refer to:
Warblade (comics), a Wildstorm character
Warblade (Dungeons & Dragons), a character class in the roleplaying game |
https://en.wikipedia.org/wiki/Reggae%20Rhythms | Reggae Rhythms was a Reggae radio station on Sirius Satellite Radio channel 97 and Dish Network channel 6097. Reggae Rhythms moved from channel 32 to channel 97 on February 14, 2007, and finally to channel 84 on June 24, 2008. It was replaced by The Joint as a result of the Sirius-XM merger. As of Aug 2022, The Joint can be found on channel 722.
See also
List of Sirius Satellite Radio stations
External links
Sirius Reggae Rhythms
Defunct radio stations in the United States |
https://en.wikipedia.org/wiki/Les%20Hatton | Les Hatton (born 5 February 1948) is a British-born computer scientist and mathematician most notable for his work on failures and vulnerabilities in software controlled systems.
He was educated at King's College, Cambridge 1967–1970 and the University of Manchester where he received a Master of Science degree in electrostatic waves in relativistic plasma and a Doctor of Philosophy in 1973 for his work on computational fluid dynamics in tornadoes.
Although originally a geophysicist, a career for which he was awarded the 1987 Conrad Schlumberger Award for his work in computational geophysics, he switched careers in the early 1990s to study software and systems failure. He has published 4 books and over 100 refereed journal publications and his theoretical and experimental work on software systems failure can be found in IEEE Transactions on Software Engineering, IEEE Computer, IEEE Software, Nature, and IEEE Computational Science and Engineering. His book Safer C pioneered the use of safer language subsets in commercial embedded control systems. He was also cited amongst the leading scholars of systems and software engineering by the Journal of Systems and Software for the period 1997–2001.
Primarily a computer scientist nowadays, he retains wide interests and has published recently on artificial complexity in mobile phone charging, the aerodynamics of javelins and novel bibliographic search algorithms for unstructured text to extract patterns from defect databases.
After spending most of his career in industry working for Oakwood Computing Associates, he is currently a professor of Forensic Software Engineering at Kingston University, London.
References
1948 births
Living people
Alumni of King's College, Cambridge
Alumni of the University of Manchester
Academics of Kingston University
British computer scientists
20th-century British mathematicians
21st-century British mathematicians
Place of birth missing (living people) |
https://en.wikipedia.org/wiki/Lyceum%20%28software%29 | Lyceum is a synchronous computer-mediated communication (CMC) software which allows groups of people to speak to one another in real time over the Internet using Voice over IP conferencing.
Lyceum was developed at the Open University in the UK and was introduced into language tutorials in 2002. It also offers an interactive whiteboard (for writing, drawing and importing images, e.g. from the Web), a concept mapping device (for taking notes or writing short texts), a word processor (for jointly writing and editing longer documents) and a written text chat facility.
The software was written in Java, with some C code to integrate a third party native library used for the Voice over IP conferencing functionality.
The use of the software for language learning has been reported at different stages, from the pilot projects since 1997 (Hauck & Haezewindt, 1999, Shield 2000, Kötter 2001, Hewer and Shield 2001), to reports of the mainstream use (Hampel 2003, Hampel & Hauck 2004). Recent articles include task design (Rosell-Aguilar, 2005), tutor roles (Hampel & Stickler, 2005, Rosell-Aguilar, 2007), tutor impressions (Rosell-Aguilar, 2006a), and student impressions (Rosell-Aguilar, 2006b)
References
Hampel, R. (2003) Theoretical Perspectives and New Practices in Audio-Graphic Conferencing for Language Learning. ReCALL, 15 (1), p 21–36.
Hampel, R. and Hauck, M. (2004) Towards and Effective Use of Audio Conferencing in Distance Learning Courses. Language Learning and Technology, 8 (1), p 66–82.
Hampel, R. & Stickler, U. (2005). New Skills for new classrooms. Training tutors to teach languages online. In CALL (Computer Assisted Language Learning). 18 (4). pp. 311 – 326.
Hampel, R. (2007). New literacies and the affordances of the new media: Using audiographic computer conferencing for language learning. In: Schneider, Würffel (eds.): Kooperation & Steuerung. Fremdsprachenlernen und Lehrerbildung mit digitalen Medien. Gießener Beiträge zur Fremdsprachendidaktik. Tübingen: Narr, 33–53.
Hauck, M. and Haezewindt, B. (1999) Adding a new perspective to distance (language) learning and teaching – the tutor's perspective. ReCALL, 11 (2), p 46–54.
Hewer, S. & Shield, L. (2001) 'Online Communities: Interactive Oral Work at a Distance', in Atkinson, T. (ed.) Reflections on computers and language learning, UK, CILT Reflections Series, 53–62.
Kötter, M. (2001) Developing Distance Language Learners’ Interactive Competence – Can Synchronous Audio do the trick? International Journal of Educational Telecommunications, 7 (4), 327–353.
Rosell-Aguilar, F. (2005) Task design for audiographic conferencing: Promoting beginner oral interaction in distance language learning. Computer Assisted Language Learning 18 (5), 417–442.
Rosell-Aguilar, F. (2006a) Online tutorial support in Open Distance Learning through audio-graphic SCMC: tutor impressions. JALT-CALL Journal, 2 (2).
Rosell-Aguilar, F. (2006b) The face-to-face and the online learner: a comparative study of tut |
https://en.wikipedia.org/wiki/Sky%20Box%20Office%20%28disambiguation%29 | Sky Box Office is Sky plc's pay-per-view television system in the UK and Ireland.
Sky Box Office may also refer to:
Sky Box Office (New Zealand), a SKY Network Television pay-per-view system which shows movies |
https://en.wikipedia.org/wiki/Insurance%20Regulatory%20Information%20System | The Insurance Regulatory Information System (IRIS) is a database of insurance companies in the United States run by the National Association of Insurance Commissioners. IRIS is designed to provide information about insurers' financial solvency.
Rating method
IRIS uses the financial statements of the insurer to calculate a series of financial ratios, which are then taken as a measure of the insurer's overall financial condition. If the ratios do not fit into a predetermined range, then IRIS may identify the company for regulation by appropriate authorities.
The system acts as an early-warning protection, which aids state insurance departments to pick out those companies that show financial problems. The ratios are merely guidelines, though: often a financial disaster comes without warning, or defies prediction.
References
Insurance in the United States |
https://en.wikipedia.org/wiki/Screensport%20%28TV%20channel%29 | Screensport was a pan-European cable and satellite sports television network that was on air from 1984 until 1993 before merging with Eurosport.
History
1984–1986: Early years
Screensport was founded in 1981 by Bob Kennedy — who had started up BBC Radio Leicester, Sky Channel (operators of the UK's first satellite television network which later became known as Sky One) and several independent commercial radio stations, backers included the American networks ABC and ESPN. A programming deal with Trans World International allowed access to events taking place around the world.
The channel began broadcasting on 29 March 1984, with Media Communications controlled the studios and transmission facilities in Knutsford, while its administration office was based in London. Apart from American sports, the station aired regular and weekly British sports including speedways and stock cars. Screensport aired only recorded programming until 31 August of that year, when they showed live greyhound racing from Wembley Stadium – including the St Leger. By late 1984, WHSmith Television Group had purchased a 15% stake in the company, RCA also acquired a 10% share in the business, within other investors included Ladbrokes and the pension fund of the National Coal Board. Former BBC executive Aubrey Singer was a prominent board member.
On 28 August 1985, the station started to expand its broadcasting area to include the Netherlands and Sweden, introducing new programmes and sports including ice speedway, Dutch ice hockey and motor sport. Coverage of English football began in the same year, screening the Area and National finals from the Freight Rover Trophy, a competition for lower division clubs. In addition, the channel both sponsored and broadcast the Football League Super Cup in the 1985–86 season. The competition was designed to compensate clubs who were banned from European competition due to the Heysel Stadium disaster, but it was scrapped after the first edition.
1987–1992: WHSmith era
On 1 December 1986, the WHSmith Television Group took over the operation and management of the network when Bob Kennedy and ABC pulled out. By the end of that year, the station had lost £700,000 and no longer broadcast in Sweden, which resulted in a loss of 100,000 customers.
On 9 April 1987, as the channel had acquired rights to cover some major events, Screensport broadcast live coverage of the US Masters golf from Augusta, and many other PGA Tour events. Grand Slam tennis was also covered in the shape of the US Open. NHL ice hockey, NBA and NASCAR racing were common items on the schedule during this period. During the 1987–88 football season, Screensport was the only source of weekly extended English Football League highlights for viewers in the United Kingdom. The channel signed a deal with Thames Television, who were the Football League's agent for international distribution, to transmit 34 recorded matches via cable and satellite. Thames produced its programme, call |
https://en.wikipedia.org/wiki/GNU%20Smalltalk | GNU Smalltalk is an implementation of the Smalltalk programming language by the GNU Project.
The implementation, unlike other Smalltalk environments, uses text files for program input and interprets the contents as Smalltalk code. In this way, GNU Smalltalk acts more like an interpreter rather than an environment in the traditional Smalltalk manner.
GNU Smalltalk includes bindings for many free software libraries including SQLite, libSDL, cairo, gettext, and Expat.
Examples
These examples work only on GNU Smalltalk 3.0 and later versions. Classic Hello world example:
'Hello World!' displayNl
Some basic Smalltalk code:
"Everything, including a literal, is an object, so this works:"
-199 abs "199"
'gst is cool' size "11"
'Slick' indexOf: $c "4"
'Nice Day Isn''t It?' asLowercase asSet asSortedCollection asString "′?acdeinsty"
Collections
Constructing and using an array:
a := #(1 'hi' 3.14 1 2 (4 5))
a at: 3 "3.14"
a reverse "((4 5) 2 1 3.14 'hi' 1)"
a asSet "Set(1 'hi' 3.14 2 (4 5))"
Constructing and using a hash:
hash := Dictionary from: { 'water' -> 'wet'. 'fire' -> 'hot' }.
hash at: 'fire' "Prints: hot"
hash keysAndValuesDo: [ :k :v |
('%1 is %2' % { k. v }) displayNl ]
"Prints: water is wet
fire is hot"
hash removeKey: 'water' "Deletes 'water' -> 'wet'"
Blocks and iterators
Parameter-passing a block to be a closure:
"remember a block."
remember := [ :name | ('Hello, %1!' % { name }) displayNl ].
"When the time is right -- call the closure!"
remember value: 'world'
"=> 'Hello, world!'"
Returning closures from a method:
Integer extend [
asClosure [
| value |
value := self.
^{ [ :x | value := x ]. [ value ] }
]
]
blocks := 10 asClosure.
setter := blocks first.
getter := blocks second.
getter value "=> 10"
setter value: 21 "=> 21"
getter value "=> 21"
Using block to send info back to the caller:
Integer extend [
ifEven: evenBlock ifOdd: oddBlock [
^self even
ifTrue: [ evenBlock value: self ]
ifFalse: [ oddBlock value: self ]
]
]
Invoke the above method, passing it a block:
10 ifEven: [ :n | n / 2 ] ifOdd: [ :n | n * 3 + 1 ] "=> 5"
Iterating over enumerations and arrays using blocks:
array := #(1 'hi' 3.14)
array do: [ :item | item displayNl ]
"=> 1"
"=> hi"
"=> 3.14"
(3 to: 6) do: [ :item | item displayNl ]
"=> 3"
"=> 4"
"=> 5"
"=> 6"
A method such as inject:into: can accept both a parameter and a block. It iterates over each member of a list, performing some function on while retaining an aggregate. This is analogous to the foldl function in functional programming languages. For example:
#(1 3 5) inject: 10 into: [ :sum :element | sum + element ] "=> 19"
On the first pass, the block receives 10 (the argument to inject) as sum, and 1 (the first ele |
https://en.wikipedia.org/wiki/32nd%20Signal%20Battalion%20%28United%20States%29 | The 32nd Signal Battalion is a Mobile Subscriber Equipment (MSE)-equipped Corps Signal Battalion. They provide Command, Control, Communications and Computer (C4) support to 22nd Signal Brigade, part of the United States Army's V Corps. The 32nd Signal Battalion consists of one Headquarters Company, three MSE companies, and one MSE signal support company.
As of 2006, the commander of 32nd Signal Battalion was Lieutenant Colonel William S. Schumaker. The Battalion Command Sergeant Major was John O. Graves.
Mission
The battalion's mission statement is:
On order, the 32nd Signal Battalion rapidly deploys to offer signals support to V Corps or other contingency forces in support of any assigned mission throughout the spectrum of conflict.
History
World War II
On 20 March 1943, the 32nd Signal Construction Company was organized and activated at Chicago, Illinois. Shortly after its activation, the company was transferred, without soldiers or equipment, to the Signal Corps Unit Training center at Camp Crowder, Missouri, and ordered into active military service as the 32nd Signal Construction Battalion on 25 March 1943.
The new battalion, consisting of construction companies A and B, and a headquarters, began training immediately for shipment overseas. After training at Camp Crowder, and aiding in flood rehabilitation work in Missouri, the battalion moved to Camp Shanks, New York, to prepare for transport to Europe. When the battalion sailed out of the North River Harbor on 27 February 1944, it consisted of twenty-three officers, one warrant officer, and 570 soldiers.
Once in England, the battalion began preparing for the 6 June invasion of Normandy. Detachment A of the battalion crossed the channel and began installing wire for communications lines later in the month, on 8 June. On the 14 of the same month, the rest of the battalion crossed to France and started work. Moving with the fighting forces across France, the battalion entered German territory at Korneli Munster on the sixteenth of September. After the capture of the Lundendorf Bridge near Remagen, the battalion strung two telephone cables taken from a captured German submarine across the Rhine river, while under attack from small arms fire and aircraft. The cables provided dependable communications between the American forces on both sides of the river at the breakthrough point. Communications support continued until the German surrender on 9 May 1945.
On 19 May, the battalion moved from Weimar, Germany, to Marseilles, France, where it re-organized as a Signal Light Construction Battalion and boarded ships en route to the Pacific Theater. On 1 August 1945, while still at sea, the ship's captain announced the end of hostilities with Japan. The battalion debarked at Hagas Ti Port, Okinawa, and set up camp on 1 September.
On 30 December 1945, the battalion was reconstituted as a corps-type signal battalion and a month later, inactivated on Okinawa.
Cold War Era
The 32nd Signal Battalion |
https://en.wikipedia.org/wiki/Astronomical%20Almanac | The Astronomical Almanac is an almanac published by the United States Naval Observatory (USNO) and His Majesty's Nautical Almanac Office (HMNAO); it also includes data supplied by many scientists from around the world. It is considered a worldwide resource for fundamental astronomical data, often being the first publication to incorporate new International Astronomical Union resolutions. The almanac largely contains Solar System ephemeris and catalogs of selected stellar and extragalactic objects. The material appears in sections, each section addressing a specific astronomical category. The book also includes references to the material, explanations, and examples. It is available one year in advance of its date.
The Astronomical Almanac Online is a companion to the printed volume. It is designed to broaden the scope of the publication, not duplicate the data. In addition to ancillary information, the Astronomical Almanac Online extends the printed version by providing data best presented in machine-readable form.
Publication contents
Section A PHENOMENA: includes information on the seasons, phases of the Moon, configurations of the planets, eclipses, transits of Mercury or Venus, sunrise/set, moonrise/set times, and times for twilight. Preprints of many of these data appear in Astronomical Phenomena, another joint publication by USNO and HMNAO.
Section B TIME-SCALES AND COORDINATE SYSTEMS: contains calendar information, relationships between time scales, universal and sidereal times, Earth rotation angle, definitions of the various celestial coordinate systems, frame bias, precession, nutation, obliquity, intermediate system, the position and velocity of the Earth, and coordinates of Polaris. Preprints of many of these data also appear in Astronomical Phenomena.
Section C SUN; covers detailed positional information on the Sun, including the ecliptic and equatorial coordinates, physical ephemerides, geocentric rectangular coordinates, times of transit, and the equation of time.
Section D MOON: contains detailed positional information on the Moon including phases, mean elements of the orbit and rotation, lengths of mean months, ecliptic and equatorial coordinates, librations, and physical ephemerides.
Section E PLANETS: consist of detailed positional information on each of the major planets including osculating orbital elements, heliocentric ecliptic and geocentric equatorial coordinates, and physical ephemerides.
Section F NATURAL SATELLITES; covers positional information on the satellites of Mars, Jupiter, Saturn (including the rings), Uranus, Neptune, and Pluto.
Section G DWARF PLANETS AND SMALL SOLAR SYSTEM BODIES: includes positional and physical data on selected dwarf planets, positional information on bright minor planets and periodic comets.
Section H STARS AND STELLAR SYSTEMS: contains mean places for bright stars, double stars, UBVRI standards, ubvy and H beta standards, spectrophotometric standards, radial velocity standar |
https://en.wikipedia.org/wiki/Agentless%20data%20collection | In the field of information technology, agentless data collection involves collecting data from computers without installing any new agents on them.
What is an agent?
For the purpose of this discussion, an agent is a software program (sometimes called a service or daemon) that runs on a computer with the primary purpose of collecting information and pushing it over the network to a central location (or else of re-publishing the information in a standard format like SNMP so that it can then be collected over the network from the central location).
The traditional approach to data collection involves installing agents on
all computers from which data is needed. Sometimes this installation step
is performed manually for each computer, other times it is automated
via a centralized installation server that pushes software to other computers.
In either case, the cost of installation (and subsequent maintenance and upgrade)
is typically proportional to the number of computers that require installation
services, and this is in turn equal to the number of computers from which data
is needed.
Agentless approach
In the agentless approach, data is collected from computers without installing
additional agents. This is accomplished by obtaining data from the software that
is already installed on the computer including the operating system
as well as previously-installed commercial products (or commercial products which do not require an installation to execute). It turns out that, in many cases, there are already more than enough programs and protocols installed on a computer where the desired information can be obtained.
The primary benefit of the agentless approach is that it is not necessary to install, upgrade and maintain additional software programs on each computer from which information is needed. Software products that use this approach may have a faster rollout and lower TCO than software products that require agents on a substantial number of computers.
Relevant network protocols
Any network protocol that returns useful information can be employed, providing only that the
protocol server is already installed. Again, the distinction between agentless
and agent-based is not the specific protocol used but whether a new protocol server
(agent) must be installed.
In many cases, it is possible to find servers for these protocols: log4j, CIFS, SSH, SNMP, Windows Management Instrumentation (for Windows platform), DTrace (for Solaris 10 platform). However, a large number of other protocols may be helpful as well.
Versus data mining
The meaning of the phrase data mining is related to but different from data collection.
The former is typically about finding useful patterns with data that is conveniently
accessible in a relational database. In contrast, the latter involves extracting data
from a variety of less convenient sources, although in some cases it may also involve
identifying or leveraging useful patterns.
See also
Data Mining
Text Mini |
https://en.wikipedia.org/wiki/SunPCi | SunPCi is a series of single-board computers with a connector that effectively allows a PC motherboard to be fitted in Sun Microsystems SPARC-based workstations based on the PCI architecture adding the capability for the workstation to act as a 'IBM PC compatible' computer. The Sun PCi cards included an x86 processor, RAM, expansion ports, and an onboard graphics controller, allowing a complete Wintel operating environment on a Solaris system. The SunPCi software running on Solaris emulates the disk drives that contain the PC filesystem. The PC software running on the embedded hardware is displayed in an X window on the host desktop; there is also a connector on the edge of the board that can optionally be used to connect a PC monitor.
History
The product arose from the issue of people who were working on a Unix workstation that was typically not Intel-based being sent a file from a Microsoft Windows based PC and being unable to handle the file. Sun termed this problem interoperability. By the year 2000 solutions to the problem such as emulators were available but their performance at the time was quite problematic. With Sun workstations adopting the PCI hardware bus standard this became possible.
These cards were the successor to the earlier SunPC cards that had been available for Sun SBus or VME systems. Prior to this a software only application binary interface and DOS emulator called Wabi was used. SunPC was offered as a replacement software emulator that could be used to run more advanced applications, with higher performance, by adding an X86 hardware accelerator. In 1992 the SunPC Accelerator SX (16 MHz 486SX) or SunPC Accelerator DX (25 MHz 486DX) were available for SBus workstations, though the SunPC program emulates the PC memory with or without the accelerator present. An accelerator card is needed for software that requires 80386 or 80486 hardware, such as Windows 3.11 running in enhanced mode or Windows 95; without this hardware SunPC runs in software-only mode which emulates an 80286. In 1997 a 133 MHz 5x86 AMD SBus co-processor was available.
The Ultra 5 workstation with an optional SunPCi for running Windows 95 or NT was announced in November 1998. The next year Ultra 5 systems including a SunPCi with a 300 MHz AMD K6-2 processor and 64 to 256 MB RAM were available. Windows applications running on this system were measured to be 40% slower than a desktop PC with a 300 MHz Pentium II, but the card was cheaper than purchasing a new PC. Following an in-depth review in 1999 with an original 300MHz 64mb memory SunPCi card, Kevin Railsback in InfoWorld magazine noted the price was competitive and the performance was suitable for business applications especially when using the output attached to the SunPCi to a dedicated monitor. The downsides were that a separate license was required for the Windows 95 operating system, MS-DOS disk drivers performed slowly and DirectX was not available unless using the separate dedicated monitor |
https://en.wikipedia.org/wiki/XHTML%20Mobile%20Profile | XHTML Mobile Profile (XHTML MP) is a hypertextual computer language standard designed specifically for mobile phones and other resource-constrained devices.
It is an XHTML document type defined by the Open Mobile Alliance. XHTML-MP is derived from XHTML Basic 1.0 by adding XHTML Modules, with later versions of the standard adding more modules. However, for certain modules, XHTML-MP does not mandate a complete implementation so an XHTML-MP browser may not be fully conforming on all modules.
The XHTML MP 1.2 DTD is the current recommendation, finalized in March 2008.
XHTML Basic 1.1 became a W3C Recommendation in July 2008, superseding XHTML-MP 1.2.
Document Type Declaration
To validate as XHTML-MP, a document must contain a proper Document Type Declaration, (DTD) or DOCTYPE, depending on the version of specification followed
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.0//EN"
"http://www.wapforum.org/DTD/xhtml-mobile10.dtd">
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.1//EN"
"http://www.openmobilealliance.org/tech/DTD/xhtml-mobile11.dtd">
<!DOCTYPE html PUBLIC "-//WAPFORUM//DTD XHTML Mobile 1.2//EN"
"http://www.openmobilealliance.org/tech/DTD/xhtml-mobile12.dtd">
Note that a series of revisions have been issued to correct technical errors in the above DTDs, and the DTD format is more complex and less widely supported than that of standard HTML.
MIME types
The MIME type for XHTML Mobile Profile is "application/vnd.wap.xhtml+xml". Conforming user agents should also accept "application/xhtml+xml" and "text/html". Many desktop browsers will only validate XHTML-MP at the display time, if an XML MIME type is specified.
References
External links
Open Mobile Alliance
W3C Recommendation for XHTML 1.1
W3C Recommendation for Modularization of XHTML as of April 10, 2001.
XHTML-MP Authoring PracticesvteStandards
Open Mobile Alliance standards
Mobile software
XHTML
§ |
https://en.wikipedia.org/wiki/Dorr%20Felt | Dorr Eugene Felt (March 18, 1862 – August 7, 1930) was an American inventor and industrialist who was known for having invented the Comptometer, an early computing device, and the Comptograph, the first printing adding machine.
The Felt & Tarrant Manufacturing Company that he co-founded with Robert Tarrant on January 25, 1889 remained a major player in the calculator industry until the mid-1970s.
Biography
Dorr E. Felt was born in Beloit, Wisconsin where he grew up on the family farm and which he left at age 14 to seek employment. His father, Eugene K. Felt, was a member of the Wisconsin State Assembly. At 16, "his bent of mind, leaning towards mechanics, led him to seek work in a machine shop in Beloit where he found his first employment in the spring of 1878." At 18, he started to learn French and eventually spoke it fluently. In early 1882, at age 20, he came to Chicago and worked as foreman of a rolling mill that had a daily output valued at $2,000. In that time he began his work on the Comptometer.
During the US Thanksgiving holidays of 1884 he decided to build the prototype of a new calculating machine that he had invented. Because of his limited amount of money, he used a macaroni box for the outside box, and skewers, staples and rubber bands for the mechanism inside. It was finished soon after New Year's Day, 1885.
Felt brought his idea to Chicago businessman Robert Tarrant. They signed a partnership contract on November 28, 1887, and incorporated the Felt & Tarrant Manufacturing Company on January 25, 1889. Felt later went on to invent more devices and acquired 46 domestic patents and 25 foreign ones. The original macaroni box prototype and the first Comptograph ever sold are now part of the Smithsonian Museum collection of antique calculators.
He was married to Agnes McNulty in 1891 and the couple had four daughters together.
Felt was awarded the John Scott Medal of The Franklin Institute in 1889. Dorr Felt also was the first ambassador for the Department of Commerce formed to study labor abroad after World War I. He was an excellent photographer, and many of his war-time and post-war time photos were used by the government. Dorr traveled the world and loved learning. He made his home in Chicago and summered in Laketown Township, Michigan, where the Dorr E. Felt Mansion is registered on the list of National Historic Places.
The Summer Mansion
Dorr was attracted to the pristine beauty of the West Michigan coastline, then known as "the Midwest Riviera," and in 1919 purchased several hundred acres on Lake Michigan in the rolling dunes between Holland and Saugatuck, naming his estate "Shore Acres Farm." Felt began construction of the "Big House" in 1925 for his wife, Agnes. This summer home would be large enough to accommodate his married daughters and their families. Completed in 1928, the 12,000+ square foot mansion consists of 25 rooms, including a third-floor ballroom. Unfortunately, Agnes died in August 1928, six weeks after th |
https://en.wikipedia.org/wiki/GeoSTAC | GeoSTAC is a set of spatial data and tools accessed through a Geographic Information System.
The databases currently contain about 55 GB of data and there are three specialised spatial analysis tools currently available.
GeoSTAC concentrates on agricultural and environmental GIS issues.
It provides a consistent framework for analyses.
One of the primary reasons for GeoSTAC is to understand the agricultural landscape and the interaction of important environmental variables.
GeoSTAC runs within the ESRI ArcGIS software platform (ESRI, Redlands, CA) with the ESRI Spatial Analyst extension.
With GeoSTAC, users can perform geospatial analysis that involves:
Crop production
Soils characteristics
Natural resources management
Weather
Land use/land cover
Agrochemical use
River and stream networks
Watershed characteristics
The databases within GeoSTAC cover all or part of the United States, although the methods can be applied to any area for which data is available.
Many of the operations possible with GeoSTAC could be performed manually by proficient GIS users.
However, GeoSTAC enables these to be performed more easily and with much of the data necessary already collated.
References
GeoSTAC.org official site
Environmental Systems Research Institute
GIS software
ArcGIS Extension |
https://en.wikipedia.org/wiki/Samurai%20Jack%3A%20The%20Shadow%20of%20Aku | Samurai Jack: The Shadow of Aku is an action-adventure video game released in 2004 by Adrenium Games and published by Sega and based on the Samurai Jack animated television series on Cartoon Network. The series' original voice actors, including Phil LaMarr, Mako Iwamatsu, Jeff Bennett, John DiMaggio, and Jennifer Hale, reprised their respective roles for the game. The game was released for the PlayStation 2 and GameCube. An Xbox version of the game was planned, but never released, even though it was included on the official Xbox 360 Backwards Compatibility list.
It received "mixed" reviews according to the review aggregation website Metacritic. With Shadow of Aku being unreleased on the Xbox, the next licensed Samurai Jack game, Battle Through Time, was released on August 21, 2020, becoming the first Samurai Jack game available on Microsoft platforms.
Gameplay
The game features an original story interconnected throughout 18 levels in 4 areas (Village: 5 levels, Forest: 4 levels, Underground: 4 levels, and Aku City: 5 levels). The player takes control of Jack, the series' protagonist and main character, as he rescues villagers, battles Aku's minions, and ultimately searches for the time portal to take him back to his own time. Jack's move set contains 25 moves and combo attacks, and his weapons include three elemental swords, shurikens, and a bow and arrow. The player can also fill Jack's "Zen meter", which allows him to enter a special slow-motion attack mode called "Sakai mode", among other things. The game ends in a final battle with Jack's nemesis, Aku. Other bosses include Mad Jack and the Scotsman.
Reception
Samurai Jack: The Shadow of Aku received mixed reviews from critics. Mary Jane Irwin of IGN criticized the game for its annoying combat system, "uninteresting" story, and lack of challenge in boss battles. She also heavily criticized the game's visuals, saying, "Everything is incredibly angular and the only way to describe it is awful. It's just sad that in no way was the show's incredible presentation translated into the videogame." GameSpot's Alex Navarro called it "utterly forgettable" and said, "its lack of depth, style, or technical polish essentially ruins whatever chance it ever could have had to appeal to anyone outside of the most diehard of Samurai Jack fans." Both critics did, however, compliment the game on its sound.
The Sydney Morning Herald gave it a score of two-and-a-half stars out of five and stated that "While [the game] is an enjoyable adventure for youngsters, it is also wearingly generic and disappointingly brief." The Times gave it only two stars out of five and said, "The trouble is that once you have got the hang of the swordplay, throwing stars and bow and arrow, it all becomes a bit repetitive, while the problem-solving element to the game provides little challenge."
References
External links
2004 video games
PlayStation 2 games
GameCube games
Cancelled Xbox games
Action-adventure games
Video games b |
https://en.wikipedia.org/wiki/Plain%20Folk%20of%20the%20Old%20South | Plain Folk of the Old South is a 1949 book by Vanderbilt University historian Frank Lawrence Owsley, one of the Southern Agrarians. In it he used statistical data to analyze the makeup of Southern society, contending that yeoman farmers made up a larger middle class than was generally thought.
Historical perspectives
Historians have long debated the social, economic, and political roles of Southern classes. Terms used by scholars for the self-sufficient farmers at the middle economic level include "common people" and "yeomen." At the lowest level were the struggling poor whites, known disparagingly in some areas of the South as "Crackers."
In the colonial and antebellum years, subsistence farmers tended to settle in the back country and uplands. They generally did not raise commodity crops and owned few or no slaves. Jeffersonian and Jacksonian Democrats favored the term "yeoman" for a land-owning farmer. It emphasized an independent political spirit and economic self-reliance.
Views of Olmsted, Dodd, and Phillips
Northerners such as Frederick Law Olmsted, who traveled in and wrote about the 1850s South, through the early 20th-century historians such as William E. Dodd and Ulrich B. Phillips, assessed common southerners as minor players in the antebellum social, economic, and political life of the South.
Twentieth-century romantic portrayals of the antebellum South, such as Margaret Mitchell's novel Gone with the Wind (1936) and the 1939 film adaptation, mostly ignored the yeomen. The nostalgic view of the South emphasized the elite planter class of wealth and refinement, controlling large plantations and numerous slaves.
Novelist Erskine Caldwell's Tobacco Road portrayed the degraded condition of impoverished whites dwelling beyond the great plantations.
Frank Lawrence Owsley
The major challenge to the view of planter dominance came from historian Frank Lawrence Owsley in Plain Folk of the Old South (1949). His work ignited a long historiographical debate. Owsley started with the work of Daniel R. Hundley, who in 1860 had defined the southern middle class as "farmers, planters, traders, storekeepers, artisans, mechanics, a few manufacturers, a goodly number of country school teachers, and a host of half-fledged country lawyers, doctors, parsons, and the like". To find these people, Owsley turned to the name-by-name files on the manuscript federal census. Using their own newly invented codes, the Owsleys created databases from the manuscript federal census returns, tax and trial records, and local government documents and wills. They gathered data on all southerners. Historian Vernon Burton described Owsley's Plain Folk of the Old South, as "one of the most influential works on southern history ever written".
Plain Folk argued that southern society was not dominated by planter aristocrats, but that yeoman farmers played a significant role in it. The religion, language, and culture of these common people created a democrati |
https://en.wikipedia.org/wiki/Stella%20%28software%29 | Stella is a computer program available in three versions (Great Stella, Small Stella and Stella4D). It was created by Robert Webb of Australia. The programs contain a large library of polyhedra which can be manipulated and altered in various ways.
Polyhedra
Polyhedra in Great Stella's library include the Platonic solids, the Archimedean solids, the Kepler-Poinsot solids, the Johnson solids, some Johnson Solid near-misses, numerous compounds including the uniform polyhedra, and other polyhedra. Operations which can be performed on these polyhedra include stellation, faceting, augmentation, dualization (also called "reciprocation"), creating convex hulls, and others.
All versions of the program enable users to print nets for polyhedra. These nets may then be assembled into actual three-dimensional polyhedral models of great beauty and complexity.
Stella4D
In 2007, a Stella4D version was added, allowing the generation and display of four-dimensional polytopes (polychora), including a library of all convex uniform polychora, and all currently known nonconvex star polychora, as well as the uniform duals. They can be selected from a library or generated from user created polyhedral vertex figure files.
Features
Stella provides a configurable workspace comprising several panels. Once a model has been selected from the range available, different views of it may be displayed in each panel. These views can also include measurements, symmetries and unfolded nets.
A variety of operations may be performed on any polyhedron. In 3D these include: stellation, faceting, augmentation, excavation, drilling and dualising.
Other features include spring network relaxation, generation of the convex hull, and generation of cupolaic blends and related figures.
Release history
v1.0 – 20 August 2001 – First release of Stella
v1.1 – 14 January 2002
v2.0 – 12 September 2002
v2.8.7 – 16 November 2004
v3.0 – 12 June 2005
v3.5.1 – 10 May 2006
v4.0 – 13 March 2007 – (Including new "Stella4D")
v4.4 – 11 January 2008
v5.0 – 30 September 2012
v5.4 – 10 May 2014
References
(Note: journal was back-dated. Paper actually written 2003)
Further reading
(Note: journal was back-dated. Paper actually written 2004)
External links
Polyhedra
4-polytopes
3D graphics software |
https://en.wikipedia.org/wiki/Ignacio%20Antinori | Ignacio Antinori (February 17, 1885 – October 23, 1940) was an Italian-born American mobster who built one of the earlier narcotics trafficking networks in Florida. Antinori was regarded as the first boss of the Tampa crime family, later known as the Trafficante crime family.
Although much of his early life is unknown, Antinori was one of the first mobsters to emerge in Florida during the Prohibition era. By the 1930s, Antinori was one of the largest heroin traffickers in the country, with close ties to French-Corsican heroin traffickers and American mafia bosses. Antinori established a drug pipeline from Marseille, France through Cuba into Tampa, Florida. According to the Federal Bureau of Narcotics, the drugs were subsequently distributed in the Midwestern United States, primarily through St. Louis mobster Thomas Buffa and Kansas City mobsters Nicola Impastato, James DeSimone and Joseph Deluca.
Law enforcement soon began to concentrate on Antinori's operation. In addition, mobsters such as Florida mobster Santo Trafficante Sr. soon set up rival smuggling rings. Antinori was eventually eclipsed by Trafficante, who held his own strong connections to Mangano crime family boss Vincent Mangano and Profaci crime family boss Joseph Profaci in New York.
On October 23, 1940, Ignacio Antinori was sipping coffee at the Palm Garden Inn in Tampa with a friend and a young female companion. Suddenly, a gunman appeared and fired two shotgun blasts at Antinori, blowing off the back of his head. The gunman was allegedly sent by one of Antinori's dissatisfied customers, the Chicago Outfit criminal organization. Antinori had sent the Outfit a poor quality shipment of narcotics. When the Outfit complained, Antinori refused a refund. At that point, the Outfit put a murder contract on Antinori.
References
Bibliography
Sifakis, Carl The Mafia Encyclopedia. New York: Da Capo Press, 2005.
Deiche, Scott M. Cigar City Mafia - A Complete History of the Tampa Underworld, Barricode Books, 3-25-2004, ASIN# 8004449516.
External links
American Mafia.com The KC/Tampa Drug Connection By Scott M. Deitche
1885 births
1940 deaths
Gangsters from Palermo
Trafficante crime family
Murdered American gangsters of Sicilian descent
People murdered in Florida
Male murder victims
Deaths by firearm in Florida
Italian emigrants to the United States
People murdered by the Chicago Outfit |
https://en.wikipedia.org/wiki/Computer%20Music%20Journal | Computer Music Journal is a peer-reviewed academic journal that covers a wide range of topics related to digital audio signal processing and electroacoustic music. It is published on-line and in hard copy by MIT Press. The journal is accompanied by an annual CD/DVD that collects audio and video work by various electronic artists. Computer Music Journal was established in 1977. According to the Journal Citation Reports, the journal has a 2016 impact factor of 0.405.
References
External links
Journal page at publisher's website
Music journals
Academic journals established in 1977
MIT Press academic journals
Quarterly journals
English-language journals |
https://en.wikipedia.org/wiki/JFS | JFS may refer to:
Computing
JavaServer Faces, Java web application framework
Journaling file system, a type of file system
JFS (file system), a journaling file system by IBM
Veritas File System, another journaling file system called JFS and OnlineJFS in HP-UX
Organisations
Jabhat Fateh al-Sham, a Salafist jihadist rebel group fighting in the Syrian Civil War
Jewish Family Services, former name of the Jewish Board of Family and Children's Services
John Fishwick & Sons, an English bus company
JFS (school), a Jewish secondary school in North London, England
The John Fisher School, a Catholic school in Purley, Surrey, England
Publications
Journal of Food Science
Journal of Futures Studies
See also
JFFS, another, similarly named, journaling file system |
https://en.wikipedia.org/wiki/Jason%20Cong | Jingsheng Jason Cong (; born 1963 in Beijing) is a Chinese-born American computer scientist, educator, and serial entrepreneur. He received his B.S. degree in computer science from Peking University in 1985, his M.S. and Ph. D. degrees in computer science from the University of Illinois at Urbana-Champaign in 1987 and 1990, respectively. He has been on the faculty in the Computer Science Department at the University of California, Los Angeles (UCLA) since 1990. Currently, he is a Distinguished Chancellor’s Professor and the director of Center for Domain-Specific Computing (CDSC).
Research contributions and commercial impact
Cong made fundamental contributions to the FPGA synthesis technology. His result in the early 1990s on depth-optimal mapping (FlowMap) for lookup-table based FPGAs is a cornerstone of all FPGA logic synthesis tools used today. This, together with the subsequent works on the cut-enumeration and Boolean matching based methods for FPGA mapping, led to a successful startup company Aplus Design Technologies (1998-2003) founded by Cong. Aplus developed the first commercially available FPGA architecture evaluation tool and physical synthesis tool, which were OEMed by most FPGA companies and distributed to tens of thousands of FPGA designers worldwide. Aplus was acquired by Magma Design Automation in 2003, which is now part of Synopsys.
Cong’s research also made significant impact on high-level synthesis (HLS) for integrated circuits. The decade-long research in 2000s by his group led to another UCLA spin-off, AutoESL Design Automation (2006-2011), co-founded by Cong. AutoESL developed most widely used HLS tool for FPGAs and was acquired by Xilinx in 2011. The HLS tool from AutoESL (renamed as Vivado HLS after Xilinx acquisition) allows FPGA designers to use C/C++ software programming languages instead of hardware description languages for FPGA design and implementation.
In 2009, Cong led a group of twelve faculty members from UCLA, Rice, Ohio-State, and UC Santa Barbara and won a highly competitive NSF Expeditions in Computing Award on Customizable Domain-Specific Computing (CDSC).
Cong’s research on interconnect-centric design for integrated circuits plays a significant role in overcoming the timing closure challenge in deep submicron designs in 1990s. His work on VLSI interconnect planning, synthesis, and layout optimization as well as highly scalable multi-level analytical circuit placement are embedded in the core of all physical synthesis tools developed by the EDA industry. The best-known industry adoption example was Magma Design Automation, which was founded in 1997 aiming at achieving timing closure through physical synthesis. Cong served on its Technical Advisory Board since its inception until its IPO, and later as its Chief Technology Advisor from 2003 to 2008. Magma was acquired by Synopsys in 2012.
Selected awards
Cong's work on FlowMap received the 2011 ACM/IEEE A. Richard Newton Technical Impact Award in Electr |
https://en.wikipedia.org/wiki/Coordinated%20Video%20Timings | Coordinated Video Timings (CVT; VESA-2013-3 v1.2) is a standard by VESA which defines the timings of the component video signal. Initially intended for use by computer monitors and video cards, the standard made its way into consumer televisions.
The parameters defined by standard include horizontal blanking and vertical blanking intervals, horizontal frequency and vertical frequency (collectively, pixel clock rate or video signal bandwidth), and horizontal/vertical sync polarity.
The standard was adopted in 2002 and superseded the Generalized Timing Formula.
Reduced blanking
CVT timings include the necessary pauses in picture data (known as "blanking intervals") to allow CRT displays to reposition their electron beam at the end of each horizontal scan line, as well as the vertical repositioning necessary at the end of each frame. CVT also specifies a mode ("CVT-R") which significantly reduces these blanking intervals (to a period insufficient for CRT displays to work correctly) in the interests of saving video signal bandwidth when modern displays such as LCD monitors are being used, since such displays typically do not require these pauses in the picture data.
In revision 1.2, released in 2013, a new "Reduced Blanking Timing Version 2" mode was added which further reduces the horizontal blanking interval from 160 to 80 pixels, increases pixel clock precision from ±0.25 MHz to ±0.001 MHz, and adds the option for a 1000/1001 modifier for ATSC/NTSC video-optimized timing modes (e.g. 59.94 Hz instead of 60.00 Hz or 23.976 Hz instead of 24.000).
CEA-861-H introduced RBv3. RBv3 defines ways to specify different VBLANK and HBLANK duration formulae.
CEA-861-I introduced "Optimized Video Timings" (OVT), a standard timing calculation that covers resolution/refresh rate combinations not supported by CVT.
Bandwidth
See also
Extended display identification data
References
External links
VESA free standards - includes free CVT 1.2 timings spreadsheet
Video signal
Audiovisual introductions in 2002 |
https://en.wikipedia.org/wiki/Tasklist | In computing, tasklist is a command available in Microsoft Windows and in the AROS shell.
It is equivalent to the ps command in Unix and Unix-like operating systems and can also be compared with the Windows task manager (taskmgr).
Windows NT 4.0, the Windows 98 Resource Kit, the Windows 2000 Support Tools, and ReactOS include the similar tlist command. Additionally, Microsoft provides the similar PsList command as part of Windows Sysinternals.
Usage
Microsoft Windows
On Microsoft Windows tasklist shows all of the different local computer processes currently running. tasklist may also be used to show the processes of a remote system by using the command: tasklist /S "SYSTEM".
Optionally, they can be listed sorted by either the imagename, the PID or the amount of computer usage. But by default, they are sorted by chronological order:
See also
Task manager
nmon — a system monitor tool for the AIX and Linux operating systems.
pgrep
pstree
top
References
Further reading
External links
tasklist | Microsoft Docs
Windows communication and services
Windows administration
Task managers |
https://en.wikipedia.org/wiki/Cyberlove | Cyberlove could mean:
"Cyberlove", a song from the 1998 Falco album Out of the Dark (Into the Light)
Internet romance |
https://en.wikipedia.org/wiki/Asahi%20Broadcasting%20Nagano | , also known as abn, is a Japanese broadcast network affiliated with the ANN. Their headquarters are located in Nagano Prefecture.
History
1991-04-01 It was set up as Nagano Prefecture's fourth broadcasting station.
2006-10-01 its Digital terrestrial television broadcasts begun (Utsukushigahara (Main), Zenkoji-daira, Matsumoto, Okaya-Suwa, Ina, and Iida Stations).
Stations
Analog
Nagano (Utsukushigahara) (main station) JOGH-TV 20ch
Iida 44ch
Zenkoji-daira 50ch
Okaya-Suwa 61ch
Matsumoto 50ch
Ina 61ch
Sanada 44ch
Iiyama 45ch
Saku 36ch
Omachi 62ch
Togura-Kamiyamada 61ch
Karuizawa 59ch
Okaya-Kawagishi 58ch
Yamanouchi 8ch
Togakushi-Jimbadaira 50ch
Omi 43ch
Hakuba 55ch
Akashina 36ch
Nakajo 55ch
Shinshushin-Machi 45ch
Kiso-Fukushima 45ch
Nagano-West 43ch
Mochizuki-Joyama 43ch
Nakagawa-Tajima 60ch
Mure 62ch
Digital (ID:5)
Utsukushigahara (Main Station) JOGH-DTV 18ch
Zenkoji-daira 24ch
Matsumoto 24ch
Okaya-Suwa 41ch
Ina 24ch
Iida 33ch
Sanada 46ch
Yamanouchi 18ch
Saku 21ch
Programs
Yajiuma Plus - from 06:00 until 07:30 on Weekdays
Super Morning - from 07:30 until 09:55 on Weekdays
Wide!Scramble - from 11:30 until 13:05 on Weekdays
abn station - from 18:17 until 18:55 on Weekdays
The Ekimae TV - from 09:30 until 10:20 on Saturdays
''Kaginado - from 2:50 until 2:55 on Wednesdays
Rival Stations
Shin-etsu Broadcasting (SBC)
Nagano Broadcasting Systems (NBS)
TV. Shinshu (TSB)
External links
Asahi Broadcasting Nagano
All-Nippon News Network
Asahi Shimbun Company
Television stations in Japan
Companies based in Nagano Prefecture
Television channels and stations established in 1991
Mass media in Nagano (city)
1991 establishments in Japan |
https://en.wikipedia.org/wiki/Burgo%27s%20Catch%20Phrase | Burgo's Catch Phrase was an Australian game show that ran between 1997 and 2004, produced by Southern Star Group (and later by the joint-venture Endemol Southern Star) for the Nine Network. The show was based on the British and American versions of the programme, and was originally known simply as Catch Phrase until 1999 where the show was renamed as Burgo's Catch Phrase in honour of its host, John Burgess. The show was cancelled in 2004 after a revamp of the show and a hiatus in 2001.
Contestants would have to identify the familiar phrase represented by a piece of animation, with the show's mascot — a character called "Jimmy" — often appearing. In the original run, two contestants played in each game, but in the 2002 revamp, this was increased to three.
The Main Game
In the main game, at the start of each round, one contestant stopped a randomiser which consisted of money amounts by hitting his/her button. The value that was landed would then be the amount for the normal catch phrases. On each normal catch phrase, the computer would draw it on the screen. When it was done, a bell would ring, signifying the contestants to buzz-in when they think they know the answer.
A regular catch phrase could be worth $20–$75 in the first round, $40–$100 in round two, and $75–$150 in round three
A correct answer won the contestant the pre-determined money amount, plus a chance to solve the Bonus Catch Phrase which was hidden behind nine squares with the show's logo on each. To choose a square, the contestant had to hit their button to stop a randomiser from flashing around the board after which the square was revealed, and they had a chance to guess. A correct answer would win bonus money for the player ($100 for the first round, $200 for the second round and $300 for the third round.) Also, each round's Bonus Catch Phrase offered a minor prize hidden behind a mystery square.
In the 2002 revival, if in the second round, the Bonus Catch Phrase was solved after five squares or less, another round worth $200 was played. Also, there was a mystery Cash Prize of $200 in one game, which increased by $200 the next day if it was not won.
After three rounds, the player with the most money won the game and played the Super Catch Phrase.
Super Catch Phrase
The final round involved a game board (five by five grid) with 25 lettered squares (A–Y) with catchphrases hidden behind each. The winning contestant had the task to capture five squares in a horizontal, vertical or diagonal line within 60 seconds. Prizes were won if successful, with a larger prize if the winning player used the central "M" square. It is possible to win both prizes if two lines were made, where one line did went through the "M" square and the other line didn't go through the "M" square.
From their fifth winning show onwards, champions could win a car by completing a line through the "M" square. For three seasons, the M square displayed the logo of the manufacturer providing the car. Originally, |
https://en.wikipedia.org/wiki/CMOS%20%28disambiguation%29 | CMOS is a complementary metal–oxide–semiconductor, a class of integrated circuits.
CMOS may also refer to:
Technology
Nonvolatile BIOS memory, in a personal computer, historically known as CMOS with a CMOS battery
CMOS sensor, an active pixel sensor in a digital camera
Credence Systems (former NASDAQ symbol CMOS), a former semiconductor equipment manufacturer
Other uses
Canadian Meteorological and Oceanographic Society, a Canadian society dedicated to atmospheric and oceanic sciences
The Chicago Manual of Style
CMOs, or occasionally, CMOSContract manufacturing organizations, company with customizable outsourced manufacturing capabilities
See also
CMO (disambiguation) |
https://en.wikipedia.org/wiki/Stored%20program%20control | Stored program control (SPC) is a telecommunications technology for telephone exchanges. Its characteristic is that the switching system is controlled by a computer program stored in a memory in the switching system. SPC was the enabling technology of electronic switching systems (ESS) developed in the Bell System in the 1950s, and may be considered the third generation of switching technology. Stored program control was invented in 1954 by Bell Labs scientist Erna Schneider Hoover, who reasoned that computer software could control the connection of telephone calls.
History
Proposed and developed in the 1950s, SPC was introduced in production electronic switching systems in the 1960s. The 101ESS private branch exchange (PBX) was a transitional switching system in the Bell System to provide expanded services to business customers that were otherwise still served by an electromechanical central office switch. The first central office switch with SPC was installed at Morris, Illinois, in a 1960 trial of electronic switching, followed by the first Western Electric 1ESS switch at Succasunna, NJ in 1965. Other examples of SPC-based third-generation switching systems include the British GPO TXE (various manufacturers), Metaconta 11 (ITT Europe), and the AKE, ARE. Pre-digital (1970s) versions of the AXE telephone exchange by Ericsson and Philips PRX were large-scale systems in the public switched telephone network (PSTN).
SPC enables sophisticated calling features. As such exchanges evolved, reliability and versatility increased.
Second-generation exchanges such as Strowger, panel, rotary, and crossbar switches were constructed purely from electromechanical switching components with combinational logic control, and had no computer software control. The first generation were the manual switchboards operated by attendants and operators.
Later crossbar systems also used computer control in the switching matrices, and may be considered SPC systems as well. Examples include the Ericsson ARE 11 (local) and ARE 13 (transit), as well as the North Electric NX-1E & D Switches, and the ITT Metaconta 11, once found throughout Western Europe and in many countries around the world. SPC technology using analog switching matrices was largely phased out in the 1980s and had disappeared from most modern networks by the late 1990s.
The addition of time-division multiplexing (TDM) decreased subsystem sizes and dramatically increased the capacity of the telephone network. By the 1980s, SPC technology dominated the telecommunications industry.
Viable, fully digital switches emerged in the 1970s, with early systems, such as the French Alcatel E10 and Canadian Nortel DMS series going into production during that decade. Other widely adopted systems became available in the early 1980s. These included Ericsson AXE 10, which became the world's most popular switching platform, the Western Electric 5ESS used through the US and in many other countries, the German designed Sieme |
https://en.wikipedia.org/wiki/Cape%20of%20Hate | Cape of Hate is the second EP by cybergrind band Genghis Tron. Only 150 copies were made, and they were sold at the band's 2006 spring tour supporting their first EP, Cloak of Love. It contains various remixes and demos of the tracks from Cloak of Love.
Track listing
References
Genghis Tron albums
2006 EPs |
https://en.wikipedia.org/wiki/Plug%20board | Plug board may refer to:
Plugboard, a component of certain encryption machines, unit record equipment and some early computers
Telephone switchboard, another name for a manual exchange
Power strip a device that plugs into a power socket to increase the number of power sockets available for other devices
See also
Patch panel, a number of circuits, usually of the same or similar type, which appear on jacks for monitoring, interconnecting, and testing circuits in a convenient, flexible manner
Plug (disambiguation)
Perforated hardboard, tempered hardboard which is pre-drilled with evenly spaced holes. The holes are used to accept pegs or hooks to support various items, such as tools in a workshop |
https://en.wikipedia.org/wiki/12-channel%20carrier%20system | In the U.S. telephone network, the 12-channel carrier system was an early frequency-division multiplexing system standard, used to carry multiple telephone calls on a single twisted pair of wires, mostly for short to medium distances. In this system twelve voice channels are multiplexed in a high frequency carrier and passed through a balanced pair trunk line similar to those used for individual voice frequency connections. The original system is obsolete today, but the multiplexing of voice channels in units of 12 or 24 channels in modern digital trunk lines such as T-1 is a legacy of the system.
History
The twelve channel scheme was first devised in the early 1930s to provide a line spectrum covering 60 to 108 kHz for the Type J Carrier Telephone System, an equivalent four wire (on two wire facilities) open wire carrier that was used almost exclusively for interstate long haul toll telephony. This became the basic building block, the "channel group", for all succeeding long haul systems, such as Type K and all the Type L systems into the late 1970s. All long haul "channel groups" used the single-sideband/suppressed carrier heterodyne scheme that was produced by a Western Electric Type A-1 through A-6 channel bank.
The twelve channel scheme, in order to maintain some bandwidth and routing compatibility, was carried through to the short haul carriers, as well, as they started developing to eliminate voice band open wire trunk lines in the 1950s. The Bell System vacuum-tube driven N-1 Carrier of the early 1950s was the most used twelve channel carrier system, using double sideband/unsuppressed carrier operation which didn't need network timebase synchronization to maintain frequency accuracy. N-2 was similar in heterodyning scheme, but in discrete transistorized "plug-in unit" architecture, while N3 used the same frequency plan but a scheme of using single sideband with a different voice channel on each side of the carrier, a technique first seen on the 16 channel Type "O" open wire short haul carrier of the 1950s. This doubled the capacity to 24 channels, the same as a basic digital Type T PCM carrier introduced in the late 1950s, which became the now-ubiquitous "T-1" of the digital world.
Repeaters were spaced approximately 6 miles (10 km) apart, depending on wire gauge. With few exceptions, N-carriers used 19 gage unloaded toll pairs in two-wire operation. Each repeater either received from both directions at a low frequency band and sent in both directions at a higher band, or vice versa. This frequency frogging allowed equivalent four-wire operation on a single cable pair in two-wire operation.
During the period when Type N-1 was in widespread use, Lenkurt Corporation, owned and controlled by General Telephone, fielded a variant competitor, the Type BN. BN used the same pairs and repeaters as did the Bell N-CXR, but used four channel "groups," lower single-sideband heterodyning, and 24 channels per carrier, as later seen on Western Electr |
https://en.wikipedia.org/wiki/Norm%20%28artificial%20intelligence%29 | Norms can be considered from different perspectives in artificial intelligence to create computers and computer software that are capable of intelligent behaviour.
In artificial intelligence and law, legal norms are considered in computational tools to automatically reason upon them. In multi-agent systems (MAS), a branch of artificial intelligence (AI), a norm is a guide for the common conduct of agents, thereby easing their decision-making, coordination and organization.
Since most problems concerning regulation of the interaction of autonomous agents are linked to issues traditionally addressed by legal studies, and since law is the most pervasive and developed normative system, efforts to account for norms in artificial intelligence and law and in normative multi-agent systems often overlap.
Artificial intelligence and law
With the arrival of computer applications into the legal domain, and especially artificial intelligence applied to it, logic has been used as the major tool to formalize legal
reasoning and has been developed in many directions, ranging from deontic logics to formal systems of argumentation.
The knowledge base of legal reasoning systems usually includes legal norms (such as governmental regulations and contracts), and as a consequence, legal rules are the focus of knowledge representation and reasoning approaches to automatize and solve complex legal tasks. Legal norms are typically represented into a logic-based formalism, such a deontic logic.
Artificial intelligence and law applications using an explicit representation of norms range from checking the compliance of business processes and the automatic execution of smart contracts to legal expert systems advising people on legal matters.
Multi-agent systems
Norms in multi-agent systems may appear with different degrees of explicitness ranging from fully unambiguous written prescriptions to implicit unwritten norms or tacit emerging patterns. Computer scientists’ studies mirror this polarity. Explicit norms are typically investigated in formal logics (e.g. deontic logics and argumentation) to represent and reason upon them, leading eventually to architecture for cognitive agents, while implicit norms are accounted as patterns emerging from repeated interactions amongst agents (typically reinforced learning agents). Explicit and implicit norms can be used together to coordinate agents.
Explicit norms are typically represented as a deontic statement that aims at regulating the life of software agents and the interactions among them. It can be an obligation, a permission or a prohibition, and is often represented with some dialect or extension of Deontic logic. At the opposite, implicit norms are social norms that are not written, and they usually emerge from the repetitive interactions of agents.
References
Multi-agent systems
Computer law
Deontic logic |
https://en.wikipedia.org/wiki/Ziggurat%20algorithm | The ziggurat algorithm is an algorithm for pseudo-random number sampling. Belonging to the class of rejection sampling algorithms, it relies on an underlying source of uniformly-distributed random numbers, typically from a pseudo-random number generator, as well as precomputed tables. The algorithm is used to generate values from a monotonically decreasing probability distribution. It can also be applied to symmetric unimodal distributions, such as the normal distribution, by choosing a value from one half of the distribution and then randomly choosing which half the value is considered to have been drawn from. It was developed by George Marsaglia and others in the 1960s.
A typical value produced by the algorithm only requires the generation of one random floating-point value and one random table index, followed by one table lookup, one multiply operation and one comparison. Sometimes (2.5% of the time, in the case of a normal or exponential distribution when using typical table sizes) more computations are required. Nevertheless, the algorithm is computationally much faster than the two most commonly used methods of generating normally distributed random numbers, the Marsaglia polar method and the Box–Muller transform, which require at least one logarithm and one square root calculation for each pair of generated values. However, since the ziggurat algorithm is more complex to implement it is best used when large quantities of random numbers are required.
The term ziggurat algorithm dates from Marsaglia's paper with Wai Wan Tsang in 2000; it is so named because it is conceptually based on covering the probability distribution with rectangular segments stacked in decreasing order of size, resulting in a figure that resembles a ziggurat.
Theory of operation
The ziggurat algorithm is a rejection sampling algorithm; it randomly generates a point in a distribution slightly larger than the desired distribution, then tests whether the generated point is inside the desired distribution. If not, it tries again. Given a random point underneath a probability density curve, its x coordinate is a random number with the desired distribution.
The distribution the ziggurat algorithm chooses from is made up of n equal-area regions; n − 1 rectangles that cover the bulk of the desired distribution, on top of a non-rectangular base that includes the tail of the distribution.
Given a monotone decreasing probability density function f(x), defined for all x ≥ 0, the base of the ziggurat is defined as all points inside the distribution and below y1 = f(x1). This consists of a rectangular region from (0, 0) to (x1, y1), and the (typically infinite) tail of the distribution, where x > x1 (and y < y1).
This layer (call it layer 0) has area A. On top of this, add a rectangular layer of width x1 and height A/x1, so it also has area A. The top of this layer is at height y2 = y1 + A/x1, and intersects the density function at a point (x2, y2), where y2 = f(x2). |
https://en.wikipedia.org/wiki/Aaron%20Sloman | Aaron Sloman is a philosopher and researcher on artificial intelligence and cognitive science. He held the Chair in Artificial Intelligence and Cognitive Science at the School of Computer Science at the University of Birmingham, and before that a chair with the same title at the University of Sussex. Since retiring he is Honorary Professor of Artificial Intelligence and Cognitive Science at Birmingham. He has published widely on philosophy of mathematics, epistemology, cognitive science, and artificial intelligence; he also collaborated widely, e.g. with biologist Jackie Chappell on the evolution of intelligence.
Early life and education
Sloman was born in 1936, in the town of Que Que (now called Kwe Kwe), in what was then Southern Rhodesia (now Zimbabwe). His parents were Lithuanian Jews who emigrated to Southern Rhodesia around the turn of the century. Sloman describes himself as an atheist. He went to school in Cape Town between 1948 and 1953, then earned a degree in Mathematics and Physics at the University of Cape Town in 1956, after which a Rhodes Scholarship (from South African College School) took him to the University of Oxford (first Balliol College, and then St Antony's College). In Oxford, he became interested in philosophy after a brief period studying mathematical logic supervised by Hao Wang, eventually writing a DPhil in philosophy, defending the ideas of Immanuel Kant about the nature of mathematical knowledge as non-empirical and non-analytic ('Knowing and Understanding', 1962, now online at AARON SLOMAN DPHIL 1962).
Career
His first job was teaching philosophy at the University of Hull (1962–64), after which he moved to Sussex University where he worked on philosophy of mind, philosophy of science, meta-ethics, and various topics in epistemology. In 1969, he learned about artificial intelligence (AI) from Max Clowes, then a leading UK AI researcher in vision. As a result of this, he published a paper distinguishing analogical representations' from Fregean representations and criticising the logicist approach to AI as too narrow. It was presented at IJCAI in 1971, then reprinted in Artificial Intelligence.
Subsequently, he was invited by Bernard Meltzer to spend a year (1972–1973) in Edinburgh University where he met and worked with many leading AI researchers. When he went back to Sussex he helped to found what eventually grew into COGS, the School of Cognitive and Computing Sciences. He managed the Poplog development team between 1980 and 1991.
While at Sussex University he published "The Computer Revolution in Philosophy: Philosophy science and models of mind" (which emphasised the importance of architectures) in 1978, and other papers on various aspects of philosophy and AI, including work on the analysis of 'ought' and 'better', on vision on emotions in robots, on forms of representation and other topics. Much of his energy was devoted to developing new kinds of teaching materials based on POP-11 and Poplog for students |
https://en.wikipedia.org/wiki/Metacomputing | Metacomputing is all computing and computing-oriented activity which involves computing knowledge (science and technology) utilized for the research, development and application of different types of computing. It may also deal with numerous types of computing applications, such as: industry, business, management and human-related management. New emerging fields of metacomputing focus on the methodological and technological aspects of the development of large computer networks/grids, such as the Internet, intranet and other territorially distributed computer networks for special purposes.
Uses
In computer science
Metacomputing, as a computing of computing, includes: the organization of large computer networks, choice of the design criteria (for example: peer-to-peer or centralized solution) and metacomputing software (middleware, metaprogramming) development where, in the specific domains, the concept metacomputing is used as a description of software meta-layers which are networked platforms for the development of user-oriented calculations, for example for computational physics and bio-informatics.
Here, serious scientific problems of systems/networks complexity emerge, not only related to domain-dependent complexities but focused on systemic meta-complexity of computer network infrastructures.
Metacomputing is also a useful descriptor for self-referential programming systems. Often these systems are functional as fifth-generation computer languages which require the use of an underlying metaprocessor software operating system in order to be operative. Typically metacomputing occurs in an interpreted or real-time compiling system since the changing nature of information in processing results may result in an unpredictable compute state throughout the existence of the metacomputer (the information state operated upon by the metacomputing platform).
In socio-cognitive engineering
From the human and social perspectives, metacomputing is especially focused on: human-computer software, cognitive interrelations/interfaces, the possibilities of the development of intelligent computer grids for the cooperation of human organizations, and on ubiquitous computing technologies. In particular, it relates to the development of software infrastructures for the computational modeling and simulation of cognitive architectures for various decision support systems.
In systemics and from philosophical perspective
Metacomputing refers to the general problems of computationality of human knowledge, to the limits of the transformation of human knowledge and individual thinking to the form of computer programs. These and similar questions are also of interest of mathematical psychology.
See also
Complex system
Computer
Distributed computing
High-performance computing
Meta-
Meta-knowledge
Meta-mathematics
Metacomputing software
Metaprogramming
Parallel computing
Supercomputing
References
Further reading
Special Issue on Metacomputing: From Wo |
https://en.wikipedia.org/wiki/RoboCop%20%28character%29 | Officer Alex James Murphy (designation number: OCP Crime Prevention Unit 001), commonly known as RoboCop, is a fictional cybernetically enhanced officer of the Detroit Police Department from Murfreesboro, Tennessee, and is the main protagonist in the Robocop film series. Murphy is killed in the line of duty, and is resurrected and transformed into the cyborg law enforcement unit RoboCop by the megacorporation Omni Consumer Products (OCP). In the original screenplay, he is referred to as Robo by creators Edward Neumeier and Michael Miner.
Concept and creation
Edward Neumeier's script and idea were rejected by many studios, and the name was thought as an "unsuitable" movie. The character was inspired by sources including Iron Man and Judge Dredd.
1987 costume
Rob Bottin was tasked with designing the RoboCop outfit. He had not previously designed a robot and struggled to think of films where a robot portrayed a main character throughout. He looked at the Star Wars film series, particularly the C-3PO character. The C-3PO costume consisted of stiff costumed extremities with a cloth midsection, which made movement and action scenes difficult. Bottin was also influenced by robots in the science fiction films Metropolis (1927) and The Day the Earth Stood Still (1951).
Bottin's first concept was described as like a Marvel Comics superhero, based on his own appreciation for comic books. He developed around 50 different designs based on feedback from Verhoeven who pushed for a more machine-like character. Bottin said the designs inevitably returned to more human because the actor had to move while wearing it. Bottin briefly fell out with Verhoeven over the latter's criticism of his designs. Verhoeven said the outfit design was one of the project's most difficult aspects because he had unrealistic expectations about what he wanted after reading Japanese science fiction mangas. He admitted that he was wrong and that it took him too long to realize it, contributing to the outfit's delayed completion. Bottin's final design features lines that imply a constant forward momentum and speed. Bottin spent ten months designing the suit.
The RoboCop outfit development was unprecedented, and both design and construction were more expensive and took longer than anticipated. Bottin and a 6-person team spent six months constructing the outfit. The outfit is effectively two suits: a flexible one made from foam latex (including the jaw, neck, gloves, abdomen, pelvis, and posterior) and painted black like cast iron; and semi- or completely rigid pieces placed over the former and made from Polyurethane (chest, limbs, and feet). Moving sections like limbs were joined with aluminum and ball bearings. The entirety of the suit is supported by an internal harness of hooks, allowing for more action-heavy movements. Bottin was unfamiliar with polyurethane and unaware that it had a terrible smell and had to be primed with toxic chemicals before painting. Bottin used fiberglass |
https://en.wikipedia.org/wiki/Sharp%20PC-E500S | The Sharp PC-E500S was a 1995 pocket computer by Sharp Corporation and was the successor to the 1989 PC-E500 model, featuring a 2.304 MHz CMOS CPU.
Description
It was slightly wider, and the keys are slightly larger than the previous model. The display had more contrast, and the keyboard cover is a (removable) hinged lid (clamshell) instead of plastic slipcase. There were also four additional BASIC commands (Multiline IF ... ENDIF, WHILE ... WEND, REPEAT ... UNTIL, SWITCH ... CASE ... ENDSWITCH)
It came with 32 KB of RAM which could be upgraded to 96 KB using memory expansion cards. The monochrome LCD had 240×32 pixels which could display four lines with 40 characters per line as well as graphics. The 256 KB system ROM that contained the BIOS, a diagnostic suite, and the BASIC interpreter used to program the device.
An algebraic calculation system was included. The Algebraic Expression Reserve (AER) memory: Frequently used formulas or constants could be stored in memory and recalled for repeated use. The PC-E500 series also performed as a scientific calculator when switched into 'CAL' mode.
It also included an X<>Y exchange key for working with complex numbers and polar to rectangular conversions.
Applications
Mathematics (integers, equations, differential & integral calculus, formulas and graphs)
Physics
Earth sciences
Meteorology
Chemistry
Biology
Geology
Electrical engineering
Mechanical engineering
In addition things like amino acids and the periodic table of elements were available. These built-in programs were accessed through a menu system and special function keys. There was also a built-in menu editor to add new software to the menus or indeed replace some built-in software or formulas.
Operating modes
BASIC (programming and execution)
CAL (scientific calculator)
MATRIX (matrices calculations)
STAT (statistics)
ENG (engineering)
AER (algebraic expressions editor). This mode can be accessed from the second main menu page (press up/down arrow near the lower left display corner).
Accuracy
10 digits (mantissa) + 2 digits (exponent) in single-precision mode.
20 digits (mantissa) + 2 digits (exponent) in double-precision mode.
In the CAL, MATRIX and STAT modes, only the single precision mode can be used.
Memory expansion
The Sharp PC-E500 series could store data and programs on memory expansion cards as well as the main RAM. Six cards were available:
CE-210M: 2 KB
CE-211M: 4 KB
CE-212M: 8 KB
CE-2H16M: 16 KB
CE-2H32M: 32 KB
CE-2H64M: 64 KB
These cards used a CR1616 lithium battery for memory backup.
The memory configuration was software-switchable from the command-line. The RAM card could be appended to the system memory, replace the system memory or act as a separate space to be used as a RAM drive (F:). The main memory could also be partitioned off to a RAM drive (E:).
Peripherals
: Thermal printer & cassette interface.
CE-140F: 2.5-inch pocket floppy drive.
CE-130T: RS-232 adaptor level converter.
|
https://en.wikipedia.org/wiki/Spurious%20wakeup | In computing, a spurious wakeup occurs when a thread wakes up from waiting on a condition variable without the variable being satisfied. It is referred to as spurious because the thread has seemingly been awakened for no reason. However, they usually happen because in between the time when the condition variable was signaled and when the waiting thread finally ran, another thread ran and changed the condition, causing a race condition. If the thread wakes up second, it will lose the race, and a spurious wakeup will occur.
On many systems, especially multiprocessor systems, the problem of spurious wakeup is exacerbated because if there are several threads waiting on the condition variable when it's signaled, the system may decide to wake them all up, treating every signal( ) to wake one thread as a broadcast( ) to wake all of them, thus breaking any possibly expected 1:1 relationship between signals and wakeup. If there are ten threads waiting, only one will win and the other nine will experience spurious wakeup.
To allow for implementation flexibility in dealing with error conditions and races inside the operating system, condition variables may also be allowed to return from a wait even if not signaled, though it is not clear how many implementations actually do that. In the Solaris implementation of condition variables, a spurious wakeup may occur without the condition being assigned if the process is signal; the wait system call aborts and returns Inter.
The Linux p-thread implementation of condition variables guarantees it will not do that.
Because spurious wakeup can happen whenever there's a race and possibly even in the absence of a race or a signal, when a thread wakes on a condition variable, it should always check that the condition it sought is satisfied. If it is not, it should go back to sleeping on the condition variable, waiting for another opportunity.
References
C POSIX library
Threads (computing) |
https://en.wikipedia.org/wiki/Siemens%20S45 | Announced in 2001, the Siemens S45 was Siemens' first ever GPRS mobile phone, allowing for faster data transmission and Internet access with the coupled dual-band GSM-900 and GSM-1800 networks.
The phone came with 360 KB of internal memory, which was considered generous at the time. This storage space was marketed as flexible because it could be manipulated like a hard disk via a supplied phone-to-serial cable, and the included software ensured that files could be transferred from the computer desktop to the phone in the drag-and-drop manner.
Later, Siemens released the S45i, with added E-mail client.
Features
Specific absorption rate (SAR) = 0,95 W/kg
S45
Mobile phones introduced in 2001
Mobile phones with infrared transmitter |
https://en.wikipedia.org/wiki/Natas%20%28computer%20virus%29 | Natas (Satan spelled backwards) is a computer virus written by James Gentile, a then-18-year-old hacker from San Diego, California who went by the alias of "Little Loc" and later "Priest". The virus was made for a Mexican politician who wanted to win the Mexican elections by affecting all the Mexican Federal Electoral Institute (IFE) computers with a floppy disk.
Description
Natas is a memory-resident stealth virus and is highly polymorphic, that affects master boot records, boot sectors of diskettes, files .COM and also .exe programs.
History
The virus first appeared in Mexico City in May 1992, spread by a consultant using infected floppy disks. The virus became widespread in Mexico and the southwest United States. The virus also made its way to the other side of the US, infecting computers at the United States Secret Service knocking their network offline for approximately three days. This led to an investigation of Priest and incorrect suspicion that the virus specifically targeted government computers.
Natas also infected computers in Canada, England, Russian Federation, Venezuela and Brazil.
See also
Computer virus
Comparison of computer viruses
References
DOS file viruses
Boot viruses
Hacking in the 1990s |
https://en.wikipedia.org/wiki/Neighborhood%20operation | In computer vision and image processing a neighborhood operation is a commonly used class of computations on image data which implies that it is processed according to the following pseudo code:
Visit each point p in the image data and do {
N = a neighborhood or region of the image data around the point p
result(p) = f(N)
}
This general procedure can be applied to image data of arbitrary dimensionality. Also, the image data on which the operation is applied does not have to be defined in terms of intensity or color, it can be any type of information which is organized as a function of spatial (and possibly temporal) variables in .
The result of applying a neighborhood operation on an image is again something which can be interpreted as an image, it has the same dimension as the original data. The value at each image point, however, does not have to be directly related to intensity or color. Instead it is an element in the range of the function , which can be of arbitrary type.
Normally the neighborhood is of fixed size and is a square (or a cube, depending on the dimensionality of the image data) centered on the point . Also the function is fixed, but may in some cases have parameters which can vary with , see below.
In the simplest case, the neighborhood may be only a single point. This type of operation is often referred to as a point-wise operation.
Examples
The most common examples of a neighborhood operation use a fixed function which in addition is linear, that is, the computation consists of a linear shift invariant operation. In this case, the neighborhood operation corresponds to the convolution operation. A typical example is convolution with a low-pass filter, where the result can be interpreted in terms of local averages of the image data around each image point. Other examples are computation of local derivatives of the image data.
It is also rather common to use a fixed but non-linear function . This includes median filtering, and computation of local variances. The Nagao-Matsuyama filter is an example of a complex local neighbourhood operation that uses variance as an indicator of the uniformity within a pixel group. The result is similar to a convolution with a low-pass filter with the added effect of preserving sharp edges.
There is also a class of neighborhood operations in which the function has additional parameters which can vary with :
Visit each point p in the image data and do {
N = a neighborhood or region of the image data around the point p
result(p) = f(N, parameters(p))
}
This implies that the result is not shift invariant. Examples are adaptive Wiener filters.
Implementation aspects
The pseudo code given above suggests that a neighborhood operation is implemented in terms of an outer loop over all image points. However, since the results are independent, the image points can be visited in arbitrary order, or can even be processed in parallel. Furthermore, in |
https://en.wikipedia.org/wiki/SP%20Manweb | SP Manweb is the regional electricity distribution network operator (DNO) for Merseyside, North Wales and parts of Cheshire. It is now part of SP Energy Networks, itself a subsidiary of the Spanish energy company Iberdrola.
Nationalised industry
The company was originally created in 1947 as the nationalised Merseyside and North Wales Electricity Board in the Electricity Act 1947. It was privatised in 1990, when it became become MANWEB plc. MANWEB was responsible for the purchase of electricity from the electricity generator (the Central Electricity Generating Board from 1958) and the distribution and sale of electricity to customers.
The total number of customers supplied by the board was:
The amount of electricity, in GWh, sold by MANWEB over its operational life was as follows:
Post privatisation
The company was purchased by Scottish Power in 1996 and subsequently become SP Manweb plc. The name Manweb continued to be used alongside the Scottish Power logo on home and retail publications until 2007, when it was replaced by ScottishPower. However, the Merseyside, Cheshire and North Wales electricity distributor continues as SP Manweb plc, which is managed, along with the Scottish network operators SP Distribution plc and SP Transmission plc, as SP Energy Networks. A fourth company, SP Power Systems Ltd, maintains the distribution networks for each of these companies.
See also
Electricity sector in the United Kingdom
References
External links
ScottishPower homepage
Companies based in Chester
Former nationalised industries of the United Kingdom
Electric power companies of the United Kingdom
Utilities of England
1947 establishments in England |
https://en.wikipedia.org/wiki/Controlling%20for%20a%20variable | In causal models, controlling for a variable means binning data according to measured values of the variable. This is typically done so that the variable can no longer act as a confounder in, for example, an observational study or experiment.
When estimating the effect of explanatory variables on an outcome by regression, controlled-for variables are included as inputs in order to separate their effects from the explanatory variables.
A limitation of controlling for variables is that a causal model is needed to identify important confounders (backdoor criterion is used for the identification). Without having one, a possible confounder might remain unnoticed. Another associated problem is that if a variable which is not a real confounder is controlled for, it may in fact make other variables (possibly not taken into account) become confounders while they weren't confounders before. In other cases, controlling for a non-confounding variable may cause underestimation of the true causal effect of the explanatory variables on an outcome (e.g. when controlling for a mediator or its descendant). Counterfactual reasoning mitigates the influence of confounders without this drawback.
Experiments
Experiments attempt to assess the effect of manipulating one or more independent variables on one or more dependent variables. To ensure the measured effect is not influenced by external factors, other variables must be held constant. The variables made to remain constant during an experiment are referred to as control variables.
For example, if an outdoor experiment were to be conducted to compare how different wing designs of a paper airplane (the independent variable) affect how far it can fly (the dependent variable), one would want to ensure that the experiment is conducted at times when the weather is the same, because one would not want weather to affect the experiment. In this case, the control variables may be wind speed, direction and precipitation. If the experiment were conducted when it was sunny with no wind, but the weather changed, one would want to postpone the completion of the experiment until the control variables (the wind and precipitation level) were the same as when the experiment began.
In controlled experiments of medical treatment options on humans, researchers randomly assign individuals to a treatment group or control group. This is done to reduce the confounding effect of irrelevant variables that are not being studied, such as the placebo effect.
Observational studies
In an observational study, researchers have no control over the values of the independent variables, such as who receives the treatment. Instead, they must control for variables using statistics.
Observational studies are used when controlled experiments may be unethical or impractical. For instance, if a researcher wished to study the effect of unemployment (the independent variable) on health (the dependent variable), it would be considered unethical by instit |
https://en.wikipedia.org/wiki/Dorothy%20Lewis%20Bernstein | Dorothy Lewis Bernstein (April 11, 1914 – February 5, 1988) was an American mathematician known for her work in applied mathematics, statistics, computer programming, and her research on the Laplace transform. She was the first woman to be elected president of the Mathematics Association of America.
Early life
Bernstein was born in Chicago, the daughter of Jewish Russian immigrants Jacob and Tille Lewis Bernstein. While her parents had no formal education, they encouraged all of their children to seek education; all five earned either a PhD or MD.
Education
Bernstein attended North Division High School (Milwaukee) in Milwaukee, Wisconsin. In 1930 she attended the University of Wisconsin, where she held a University Scholarship (1933–1934) and was elected to Phi Beta Kappa. In 1934 she graduated with both a B.A degree, summa cum laude, and a M.A. Degree in Mathematics. She did her master's thesis research on finding complex roots of polynomials by an extension of Newton's method. In 1935 she attended Brown University, where she became a member of the scientific society Sigma Xi. She received her Ph.D. in mathematics from Brown in 1939, while simultaneously holding a teaching position at Mount Holyoke College. Her dissertation was entitled "The Double Laplace Integral" and was published in the Duke Mathematical Journal.
Career
From 1943 to 1959 Bernstein taught at the University of Rochester, where she worked on existence theorems for partial differential equations. Her work was motivated by non-linear problems that were just being tackled by high-speed digital computers. In 1950, Princeton University Press published her book, Existence Theorems in Partial Differential Equations.
She spent 1959–1979 as a professor of mathematics at Goucher College, where she was chairman of the mathematics department for most of that time (1960–70, 1974–79).
She professed that she was particularly interested combining pure and applied mathematics in the undergraduate curriculum. Due in great part to Bernstein's ability to get grants from the National Science Foundation, Goucher College was the first women's university to use computers in mathematics instruction, beginning in 1961. She also developed an internship program for Goucher mathematics students to obtain meaningful employment experience. In 1972 Bernstein cofounded the Maryland Association for Educational Uses of Computers, and was interested in incorporating computers into secondary school mathematics.
Bernstein was very active in the Mathematical Association of America, where she was on the board of governors from 1965 to 1968. She served as the vice president in 1972–73, and later became the first female president of the MAA in 1979–80.
Women in mathematics
She noted that attitudes and opportunities for women changed drastically after World War II, which she attributed to two causes. First, that women demonstrated they could handle the jobs formerly held by men, and second that the |
https://en.wikipedia.org/wiki/Input%20Field%20Separators | For many command line interpreters (“shell”) of Unix operating systems, the input field separators or internal field separators or shell variable holds characters used to separate text into tokens.
The value of , (in the bash shell) typically includes the space, tab, and the newline characters by default. These whitespace characters can be visualized by issuing the "declare" command in the bash shell or printing with commands like printf %s "$IFS" | od -c, printf "%q\n" "$IFS" or printf %s "$IFS" | cat -A (the latter two commands being only available in some shells and on some systems).
From the Bash, version 4 man page:
The shell treats each character of as a delimiter, and splits the results of the other expansions into words on these characters.
If is unset, or its value is exactly , the default, then sequences of , , and at the beginning and end of the results of the previous expansions are ignored, and any sequence of characters not at the beginning or end serves to delimit words.
If has a value other than the default, then sequences of the whitespace characters and are ignored at the beginning and end of the word, as long as the whitespace character is in the value of (an whitespace character).
Any character in that is not whitespace, along with any adjacent whitespace characters, delimits a field. A sequence of whitespace characters is also treated as a delimiter. If the value of is null, no word splitting occurs.
IFS abbreviation
According to the Open Group Base Specifications, is an abbreviation for "input field separators." A newer version of this specification mentions that "this name is misleading as the IFS characters are actually used as field terminators." However is often referred to as "internal field separators."
Exploits
IFS was usable as an exploit in some versions of Unix. A program with root permissions could be fooled into executing user-supplied code if it ran (for instance) system("/bin/mail") and was called with set to , in which case it would run the program "" (in the current directory and thus writable by the user) with root permissions. This has been fixed by making the shells not inherit the IFS variable.
References
Unix |
https://en.wikipedia.org/wiki/Elizabeth%20Rather | Elizabeth "Bess" D. Rather (born 1940) is the co-founder of FORTH, Inc. and is a leading expert in the Forth programming language.
She became involved with Forth while she was at the University of Arizona, but working part-time for National Radio Astronomy Observatory (NRAO). While she initially aimed to rewrite their systems (written in Forth) in FORTRAN, her discovery of the power of Forth convinced her to leave the University to work for NRAO and Kitt Peak National Observatory, where she wrote the first Forth manual and started popularizing the language in the scientific community. She co-founded FORTH, Inc. with Charles Moore in 1973. Since then, she has become an expert in the language and one of its main proponents. She is an author of several books on the subject and has given many training seminars on its usage.
From 1980 to 2006 she was President of FORTH, Inc., headquartered in the Los Angeles area. From 1986 to 1994, she was chair of the Technical Committee X3J14 that developed the ANSI Standard (X3.215-1994) for the Forth programming language.
In 2006, she retired and lives in Hawaii, but continues with occasional Forth-related writing and teaching projects.
Publications
References
External links
FORTH, Inc.
Living people
1940 births
University of Arizona people
American computer programmers
American computer scientists
American women computer scientists
21st-century American women |
https://en.wikipedia.org/wiki/System%20Fault%20Tolerance | (DELETE) This text describes "product name", is not an encyclopedic entry.
In computing, System Fault Tolerance (SFT) is a fault tolerant system built into NetWare operating systems. Three levels of fault tolerance exist:
SFT I 'Hot Fix' maps out bad disk blocks on the file system level to help ensure data integrity (fault tolerance on the disk-block level)
SFT II provides a disk mirroring or duplexing system based on RAID 1; mirroring refers to two disk drives holding the same data, duplexing uses two data channels/controllers to connect the disks (fault tolerance on the disk level and optionally on the data-channel level).
SFT III is a server duplexing scheme where if a server fails, a constantly synchronized server seamlessly takes its place (fault tolerance on the system level).
References
Novell NetWare 4.2 documentation
Novell NetWare |
https://en.wikipedia.org/wiki/KIAC | KIAC, an abbreviation of Key Information for Air Cargo, is a computer reservations system owned and used by FedEx for booking cargo space on their freighter aircraft. It is an old IBM PO4 system and was brought to FedEx with the purchase of Flying Tigers in 1989.
History
KIAC was initially designed as a tracking/tracing system with Unit Load Device (ULD) control and shipment movement data appended to each airbill/air waybill, but subsequently grew to include several other facets in order to remain competitive with growing automation in the industry. Flying Tigers played a major role in the development and implementation of interfaces with Customs systems worldwide, and with many other aspects of developments in the airline cargo world through its participation in IATA and ATA.
Support
KIAC is supported by the company's KIAC System Support Group (KSSG) based in Los Angeles. Mainframe support is operated by Network Operations Control (NOC) in Memphis, Tennessee.
Future
KIAC is due to be replaced in the near future by a server-based system and taken off of the mainframe. It will be more user friendly by using English commands as opposed to the present three-letter acronyms.
References
FedEx |
https://en.wikipedia.org/wiki/European%20Association%20for%20Artificial%20Intelligence | The European Association for Artificial Intelligence (EurAI) (formerly European Co-ordinating Committee for Artificial Intelligence (ECCAI)) is the representative body for the European artificial intelligence community.
EurAI was established in 1982. Founding president of EurAI was Wolfgang Bibel. The aim of EurAI is to promote the study, research and application of artificial intelligence (AI) in Europe.
Activities
Every even-numbered year, EurAI, jointly with one of the member associations of EurAI, holds the European Conference on Artificial Intelligence (ECAI). The conference has become the leading conference for this field in Europe.
The Artificial Intelligence Dissertation Award sponsored by EurAI has been awarded since 1998.
Fellowship
According to the association, EurAI Fellows program was created in order to "recognise individuals who have made significant, sustained contributions to the field of artificial intelligence (AI) in Europe." It has been in operation since 1999.
References
External links
Official Website
Business AI Platform
Member Societies Of The EuAI
Artificial intelligence associations
Pan-European learned societies
1982 establishments in Europe
Organizations established in 1982 |
https://en.wikipedia.org/wiki/College%20Football%20on%20CBS%20Sports | College Football on CBS Sports is the blanket title used for broadcasts of college football games that are produced by CBS Sports, for CBS and CBS Sports Network.
CBS first televised regular season college football games in 1950, airing them on a weekly basis during periods in the 1950s and 1960s. After ABC won an exclusive contract with the NCAA in 1966, CBS then retained the rights to air a few bowl games before returning to broadcast regular season games from the major conferences and major independents in 1982.
After being outbid by ABC, CBS's college football coverage between 1991 and 1995 was again reduced to only a handful of bowl games. In 1996, CBS signed a deal with the Southeastern Conference (SEC) to carry a weekly slate of regular season games, as well as becoming the television partner for the annual Army-Navy Game.
CBS acquired the now-CBS Sports Network in 2006, which has since televised college football from the Mid American Conference, Conference USA, Mountain West Conference and Northeast Conference, as well as home football games from Army, UConn and Navy.
In 2019, CBS declined to renew its rights to SEC football, with the package ultimately going to the conference's main rightsholder ESPN beginning in 2024. CBS subsequently reached a deal to televise Big Ten football beginning in 2023, which will replace CBS's SEC package in its traditional timeslot beginning 2024.
CBS's SEC telecasts are billed as The Home Depot SEC on CBS, and all other televised college football games on the main network are usually billed as The Home Depot College Football on CBS.
History
From 1946 through 1949, WCBS-TV aired Columbia Lions football home games locally. CBS began broadcasting games nationally in 1950, with Red Barber as the play-by-play commentator.
1950s
CBS aired a weekly game during the 1950 college football season, culminating in a broadcast of the Army-Navy Game with Connie Desmond doing the play-by-play. Desmond served as play-by-play commentator for CBS's 4 broadcasts in 1951, including the first ever color telecast when #5 California played #19 Penn. However the NCAA began strictly limiting broadcasts that season and CBS would not show regular season games again until 1955.
In 1953, CBS began covering the Orange Bowl annually, broadcasting the bowl annually until losing rights to ABC in 1962. CBS would add annual coverage of the Gator Bowl in 1954, broadcasting the bowl through 1963.
In 1955, CBS regular season coverage returned. CBS used Joe Hasel, Bob Neal, Mal Stevens, Jack Drees, Francis Wallace, Tom Harmon, and Gil Stratton as commentators. Drees was usually paired on commentary with Wallace on Midwest games, while Hasel and subsequently, Neal was paired with Stevens on Eastern regional games, and Harmon was paired with Stratton in games taking place on the West Coast. CBS would lose regular season rights to NBC the next year.
In 1958, CBS began annual coverage of the Cotton Bowl Classic, a tradition that would c |
https://en.wikipedia.org/wiki/Televicentro%20%28Nicaraguan%20TV%20channel%29 | Canal 2 is a Nicaraguan free-to-air television network owned by Televicentro de Nicaragua, S.A.
History
Televicentro de Nicaragua, S.A. was founded in December 1965 by Octavio Sacasa Sarria and started broadcasting in March 1966. It was the third television channel in Nicaragua after Channel 6, owned by the Somoza family. Televicentro started broadcasting in colour in 1973.
With the triumph of the Sandinista revolution in July 1979, Channel 2 together with Channel 6 were expropriated by the Sandinista government and turned into the Sistema Sandinista de Televisión (SSTV), the Sandinista Television System. Channel 2 returned to its original owners at the end of 1989.
In 1996, Channel 2 became the first Central American TV channel to have an official web site. Canal 2 also broadcasts from relay-transmitter channel 7 in some parts of the country.
In 2005, Televicentro signed an agreement with Channel 33 from Costa Rica to broadcast the evening transmissions of Noticiero 22-22 in that country.
In 2006, the channel started streaming broadcasts.
In late 2011, Octavio Sacasa said that "the channel is not for sale", amid rising concerns that Televicentro's sale to Albavisión was finalized, as other versions of the same story have been circulating in business circles, about alleged advanced negotiations between Sacasa and Ángel González. González and Sacasa were business partners in the USA in the 80s, until becoming arch-rivals in the early 90s, when Sacasa reassumed control of Televicentro.
In 2014, the channel's news operation (TVNoticias) was taken over by Maurice Ortega, aligning it with the government's viewpoint.
Programming
As of April 2022:
Newscasts
TVN Noticias – with a half-hour edition at 6:30 a.m., three hour-long editions at 1:00 p.m., 6:00 p.m. and 6:00 p.m. and with short bulletins on weekends.
Newscasts from CNN en Español
Noticiero Univision
El Gordo y la Flaca
Primer Impacto
Foreign soap operas
Soy Luna
Estrella de Amor
Loquito Por Ti
Diseñando tu amor
La Gloria de Lucho
Nuevo Sol
Dulce ambición
Querer sin límites
Foreign TV Series
Revenge
Numbers
Flashpoint
Mentes criminales
Lo que la gente cuenta
Battle Creek
The Mob Doctor
Realitys
El conciertazo
Saber y ganar
A otro nivel
Guinness récords oficialmente asombrosos
¡A pura risa!
Kids
La casa de Mickey Mouse
3, 2, 1 ¡Vamos!
Pucca
La abeja Maya
Manny a la obra
Doctora Juguetes
Princesita Sofía
Elena de Ávalor
Jason y los Héroes del Monte Olimpo
Jake y los piratas del país de Nunca Jamás
Star vs. las Fuerzas del Mal
Lloyd en el Espacio
Miles del mañana
Henry Monstruito
Gravity Falls: un verano de misterios
El Chavo Animado
El Chapulín Colorado Animado
Guardianes de la Galaxia
¡Buena suerte, Charlie!
Los hechiceros de Waverly Place
Mech-X4
Zeke y Luther
Aaron Stone
Lab Rats
Lab Rats: Fuerza Élite
Los Guerreros Wasabi
Austin & Ally
Hannah Montana
Agente K.C.
Original productions
Luces, cámara y sazón desde tu coci |
https://en.wikipedia.org/wiki/WUCS | WUCS (97.9 FM) is a commercial sports formatted radio station licensed to Windsor Locks, Connecticut. It is owned by iHeartMedia, Inc. and serves as the Hartford media market's ESPN Radio network affiliate, whose signal reaches Bristol, where the ESPN Inc. headquarters are located. The station broadcasts from studios and offices are located on Columbus Boulevard in Hartford.
The station first signed on in July 1990 as WPKX, a country music station licensed to Enfield, Connecticut. The station originally targeted Springfield, Massachusetts even though Enfield is part of the Hartford market. However, Enfield is on the Connecticut-Massachusetts state line. It was owned by SFX Broadcasting in the late 1990s, then Capstar. AMFM owned it briefly before being acquired by Clear Channel Communications (now iHeartMedia) in 2000.
The station had an HD Radio HD2 station broadcasting Americana music since early 2006.
In March 2010, Clear Channel Communications filed an application with the FCC to move the WPKX transmitter from Provin Mountain in Feeding Hills, Massachusetts to the top of City Place in Downtown Hartford, in a bid to move the station from the Springfield Arbitron market to the larger and more lucrative Hartford Arbitron market. In January 2011, the move was refiled with a city of license change to Windsor Locks; this followed an agreement with WMAS-FM, which agreed to change its city of license from Springfield to Enfield as part of a deal involving a Clear Channel-owned generator in Albuquerque, New Mexico. The previous country format has moved to WRNX (100.9 FM).
On January 27, 2012, at 6 a.m., the station switched to a simulcast of ESPN Radio affiliate WPOP (1410 AM). The call sign was changed to WUCS on February 7, 2012. WPOP switched to Fox Sports Radio in March 2012, with ESPN Radio remaining on WUCS.
As of the 2018–19 academic year, WUCS serves as the flagship station for Connecticut Huskies radio play-by-play, including the school's football, hockey, and men's and women's basketball programs. Coverage is produced for the school by IMG Media.
References
External links
Mass media in Hartford County, Connecticut
UCS
ESPN Radio stations
Radio stations established in 1990
1990 establishments in Connecticut
IHeartMedia radio stations |
https://en.wikipedia.org/wiki/Knifetooth%20sawfish | The narrow sawfish (Anoxypristis cuspidata), also known as the pointed sawfish or knifetooth sawfish, is a species of sawfish in the family Pristidae, part of the Batoidea, a superorder of cartilaginous fish that include the rays and skates. Sawfish display a circumglobal distribution in warm marine and freshwater habitats. Their extant biodiversity is limited to five species belonging to two genera (Pristis and Anoxypristis). The sawfishes are characterised by the long, narrow, flattened rostrum or extension on their snout. This is lined with sharp transverse teeth, arranged in a way that resembles the teeth of a saw and are used for killing prey. It is found in the shallow coastal waters and estuaries of the Indo-West Pacific, ranging from the Persian Gulf to southern Japan, Papua New Guinea and northern Australia. It is the only living member of the genus Anoxypristis, but was previously included in the genus Pristis. Compared to Pristis, Anoxypristis has a narrower rostral saw with numerous teeth on the distal part and no teeth on the basal one-quarter (toothless section about one-sixth in juveniles). It reaches a length of up to .
In addition to the living Anoxypristis cuspidata, this genus includes a few extinct species that are only known from fossil remains.
Description
The narrow sawfish grows to a maximum length of about , although there are highly questionable and unconfirmed claims of much larger individuals. Its body is generally shark-like, but its most obvious feature is the flattened head, which is extended forward in a blade-like bony snout with, in Australian waters, 18 to 22 pairs of sideways-facing teeth. However, elsewhere there may be as many as 25. These teeth are short, flat, and roughly triangular in shape. The blade does not taper towards its point and in adults, the basal one-quarter is devoid of teeth. In juveniles, about one-sixth of the base is toothless. The nostrils are narrow and partially concealed by nasal flaps. The skin of young sawfish is smooth, but on older individuals, it is sparsely covered in dermal denticles. The dorsal (upper) side of the fish is greyish and the ventral (lower) side and fins are a pale grey color. The rostrum is grey with white teeth and sometimes has a chocolate-brown base portion.
Distribution and habitat
The narrow sawfish is distributed across a broad swathe of the Indo-Pacific Ocean. It is present in the waters off Iran, India, Sri Lanka, Bangladesh, Malaysia, Burma, Indonesia, and Papua New Guinea. At its western extreme, it is present in the Arabian Sea and may extend as far as Somalia. Its northern limit is the Bohai Sea, China, South Korea, and the most southerly parts of Japan, and its southern limit is the northern Australian states of Western Australia, the Northern Territory, and Queensland. The narrow sawfish is bentho-pelagic and is found at depths of about . The narrow sawfish prefers soft bottom-substrates, such as sand, mud, or seagrass, to rocky or coraline habi |
https://en.wikipedia.org/wiki/Guillemot%20%28disambiguation%29 | Guillemot may refer to:
Guillemot, a seabird
Guillemot Corporation is a French-Canadian company, focused on computer graphics cards
Joseph Guillemot (1899–1975), French athlete
Guillemots (band), a British rock band
See also
Guillemets (« »), punctuation marks |
https://en.wikipedia.org/wiki/Tvins | Tvins is a Scandinavian shopping channel broadcasting 24 hours a day.
References
Shopping networks
Pan-Nordic television channels |
https://en.wikipedia.org/wiki/Final%2024 | Final 24 is a Canadian documentary series which airs on the Discovery Channel, Global Television Network, and OWN. Released in Canada in 2006, the series chronicles the last 24 hours of the lives of famous celebrities of the late 20th century. The series was narrated by Canadian voice artist Dave McRae for a US release in 2007 on the Biography Channel and by Danny Wallace in the UK.
Episodes
Season 1
Season 2
International broadcasters
Australia - Seven HD - 10.30pm Mondays.
Austria, Germany and Switzerland - Servus TV
Germany - ZDFneo
United Kingdom - Fox
United States - The Biography Channel, Current TV
Greece - ET3
Italy - Discovery World
Poland - Discovery World
Romania - Investigation Discovery
Hungary - Discovery World
External links
Final 24 (official) on YouTube
Season 1 online
Season 2 online
The Biography Channel shows
Discovery Channel (Canada) original programming
2000s Canadian documentary television series
2006 Canadian television series debuts
Television series by Cineflix
2007 Canadian television series endings |
https://en.wikipedia.org/wiki/19%20September%20Network%20against%20Coup%20d%27Etat | The 19 September Network against Coup d'État is a Thai activist group organized to protest the 2006 Thailand coup d'état.
According to Sombat Ngamboon-anong, who registered the 19sep.org domain, The Network's website, 19sept.org was shut down by the hosting service on orders of the Thai Information and Communications Technology Ministry.
The group organized a petition signing at the Siam Paragon shopping center in Bangkok at 18.00 Friday 22 September 2006. The Student Activity Information Resource, led by Chotisak On-soong took part in the petition signing.
The group planned to hold a public hearing in protest against martial law on 18 November 2006 at Thammasat University. After the public hearing, the group planned to parade from the university to the Democracy Monument, and then proceed to Army Headquarters.
References
Activists to hold anti-coup gathering from the Nation.
Asian political websites
Political mass media in Thailand
Thai websites
Political advocacy groups in Thailand |
https://en.wikipedia.org/wiki/Sloman | Sloman is a surname, and may refer to:
Aaron Sloman, UK academic and artificial intelligence researcher
Albert Sloman, UK vice chancellor, University of Essex, 1963-1987
Anthony Sloman, English film critic
Bob Sloman, English 1920s rugby league footballer
Charles Sloman, English comic entertainer and songwriter in the mid-19th century
Edward Sloman, English silent film director and actor
Henry Brarens Sloman, English-German entrepreneur
Henry Stanhope Sloman, British Army officer
John Sloman, Welsh vocalist, with Uriah Heep
Robert Sloman (1926–2005), English screenwriter and actor
Robert Miles Sloman, English-German shipbuilder and shipowner
Roger Sloman, English actor
Sam Sloman (born 1997), American football player |
https://en.wikipedia.org/wiki/Affiliate%20network | An affiliate network acts as an intermediary between publishers (affiliates) and merchant affiliate programs. It allows website publishers to more easily find and participate in affiliate programs which are suitable for their website (and thus generate income from those programs), and allows websites offering affiliate programs (typically online merchants) to reach a larger audience by promoting their affiliate programs to all of the publishers participating in the affiliate network.
Uses
Traditional affiliate networks enable merchants to offer publishers a share of any revenue that is generated by the merchant from visitors to the publisher's site, or a fee for each visitor on the publisher's site that completes a specific action (making a purchase, registering for a newsletter, etc.). The majority of merchant programs have a revenue share model, as opposed to a fee-per-action model.
For merchants, affiliate network services and benefits may include tracking technology, reporting tools, payment processing, and access to a large base of publishers. For affiliates, services and benefits can include simplifying the process of registering for one or more merchant affiliate programs, reporting tools, access to product API's and payment aggregation.
Affiliates are generally able to join affiliate networks for free, whereas there is generally a fee for merchants to participate. Traditional affiliate networks might charge an initial setup fee and/or a recurring membership fee. It is also common for affiliate networks to charge merchants a percentage of the commissions paid to affiliates, this is known as an 'over-ride' and is payable on top of the affiliates commission.
Affiliate networks are also wary of new affiliates who do not have any known connections or experience in the industry because there have been many instances where individuals have tried to game the affiliate network. The current technological advances have given many tools to affiliate networks to fight cyber fraud in a more meaningful and effective way.
Affiliate Marketers can also join as an affiliate directly with major companies as they may have affiliate programs on their websites.
Performance network
In addition to the traditional networks, performance networks also exist. Performance networks are typically networks that, in addition to performance based promotions also offer CPM- or CPC-based display advertising. Performance networks, on the other hand, are often so-called "Middle Men" who are themselves affiliates of merchants via the traditional affiliate networks.
Notable affiliate networks
CJ Affiliate by Conversant
ClickBank
Rakuten Linkshare
Tradedoubler
See also
Advertising network or ad network
Affiliate marketing
References
Affiliate marketing |
https://en.wikipedia.org/wiki/Engineering%20News-Record | Engineering News-Record (widely known as ENR) is an American weekly magazine that provides news, analysis, data and opinion for the construction industry worldwide. It is widely regarded as one of the construction industry's most authoritative publications and is considered by many to be the "bible" of the industry. It is owned by BNP Media.
The magazine's subscribers include contractors, project owners, engineers, architects, public works officials and industry suppliers. It covers the design and construction of high-rise buildings, stadiums, airports, long-span bridges, dams, tunnels, power plants, industrial plants, water and wastewater projects, and toxic waste cleanup projects. It also covers the construction industry's financial, legal, regulatory, safety, environmental, management, corporate and labor issues.
ENR annually ranks the largest contractors and design firms in the U.S. and internationally. Its "construction economics" section covers the cost fluctuations of a wide range of building materials.
History
ENR traces its roots to two publications. The older magazine was first published as The Engineer and Surveyor in 1874. This publication was later renamed The Engineer, Architect and Surveyor, then Engineering News and American Railway Journal and eventually Engineering News. The second publication was first known as The Plumber and Sanitary Engineer. It was later renamed The Sanitary Engineer, then Engineering and Building Record, and finally Engineering Record with Frank W. Skinner as its editor (1888–1914). In 1917, Engineering News and Engineering Record merged to become the magazine that is published today, Engineering News-Record with E.J. Mehren as its editor until 1924.
Ownership
The Engineer and Surveyor was founded by George H. Frost, who sold the successor journal, Engineering News, to the John Alexander Hill and the Hill Publishing Company in 1911. The Plumber and Sanitary Engineer was founded by Henry C. Meyer, who sold the successor Engineering Record to James H. McGraw and the McGraw Publishing Company. In 1917, following the death of Hill, McGraw merged the two companies to form McGraw-Hill Publishing. The successor parent company is McGraw Hill Financial.
On September 22, 2014, McGraw-Hill divested the subsidiary McGraw-Hill Construction to Symphony Technology Group for US$320 million. The sale included Engineering News-Record, Architectural Record, Dodge and Sweet's. McGraw-Hill Construction has been renamed Dodge Data & Analytics.
On July 1, 2015, the magazine was sold to BNP Media, along with Architectural Record and SNAP (a bi-monthly print product associated with Sweet's).
ENR rankings
Engineering News-Record compiles and publishes rankings of the largest construction and engineering firms annually, measured by gross revenues.
The rankings include the largest 400 U.S. general contractors, the largest 500 U.S. design firms (architectural and engineering firms), the largest 600 U.S. specialty contractors |
https://en.wikipedia.org/wiki/SSLBridge | SSLBridge is a simple, lightweight web-based interface that allow computers access to a network using Samba.
SSLBridge users log in and navigate the network using an intuitive explorer-style interface programmed in Ajax to make it nearly as responsive as a desktop application.
External links
SSLBridge Website Internet archive link
Forums
Download
Unix network-related software |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.